#! /bin/sh
# Generated from testsuite.at by GNU Autoconf 2.69.
#
# Copyright (C) 2009-2012 Free Software Foundation, Inc.
#
# This test suite is free software; the Free Software Foundation gives
# unlimited permission to copy, distribute and modify it.
## -------------------- ##
## M4sh Initialization. ##
## -------------------- ##

# Be more Bourne compatible
DUALCASE=1; export DUALCASE # for MKS sh
if test -n "${ZSH_VERSION+set}" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on ${1+"$@"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '${1+"$@"}'='"$@"'
  setopt NO_GLOB_SUBST
else
  case `(set -o) 2>/dev/null` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi


as_nl='
'
export as_nl
# Printing a long string crashes Solaris 7 /usr/bin/printf.
as_echo='\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo$as_echo
# Prefer a ksh shell builtin over an external printf program on Solaris,
# but without wasting forks for bash or zsh.
if test -z "$BASH_VERSION$ZSH_VERSION" \
    && (test "X`print -r -- $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='print -r --'
  as_echo_n='print -rn --'
elif (test "X`printf %s $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='printf %s\n'
  as_echo_n='printf %s'
else
  if test "X`(/usr/ucb/echo -n -n $as_echo) 2>/dev/null`" = "X-n $as_echo"; then
    as_echo_body='eval /usr/ucb/echo -n "$1$as_nl"'
    as_echo_n='/usr/ucb/echo -n'
  else
    as_echo_body='eval expr "X$1" : "X\\(.*\\)"'
    as_echo_n_body='eval
      arg=$1;
      case $arg in #(
      *"$as_nl"*)
	expr "X$arg" : "X\\(.*\\)$as_nl";
	arg=`expr "X$arg" : ".*$as_nl\\(.*\\)"`;;
      esac;
      expr "X$arg" : "X\\(.*\\)" | tr -d "$as_nl"
    '
    export as_echo_n_body
    as_echo_n='sh -c $as_echo_n_body as_echo'
  fi
  export as_echo_body
  as_echo='sh -c $as_echo_body as_echo'
fi

# The user is always right.
if test "${PATH_SEPARATOR+set}" != set; then
  PATH_SEPARATOR=:
  (PATH='/bin;/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 && {
    (PATH='/bin:/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 ||
      PATH_SEPARATOR=';'
  }
fi


# IFS
# We need space, tab and new line, in precisely that order.  Quoting is
# there to prevent editors from complaining about space-tab.
# (If _AS_PATH_WALK were called with IFS unset, it would disable word
# splitting by setting IFS to empty value.)
IFS=" ""	$as_nl"

# Find who we are.  Look in the path if we contain no directory separator.
as_myself=
case $0 in #((
  *[\\/]* ) as_myself=$0 ;;
  *) as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -r "$as_dir/$0" && as_myself=$as_dir/$0 && break
  done
IFS=$as_save_IFS

     ;;
esac
# We did not find ourselves, most probably we were run as `sh COMMAND'
# in which case we are not to be found in the path.
if test "x$as_myself" = x; then
  as_myself=$0
fi
if test ! -f "$as_myself"; then
  $as_echo "$as_myself: error: cannot find myself; rerun with an absolute file name" >&2
  exit 1
fi

# Unset variables that we do not need and which cause bugs (e.g. in
# pre-3.0 UWIN ksh).  But do not cause bugs in bash 2.01; the "|| exit 1"
# suppresses any "Segmentation fault" message there.  '((' could
# trigger a bug in pdksh 5.2.14.
for as_var in BASH_ENV ENV MAIL MAILPATH
do eval test x\${$as_var+set} = xset \
  && ( (unset $as_var) || exit 1) >/dev/null 2>&1 && unset $as_var || :
done
PS1='$ '
PS2='> '
PS4='+ '

# NLS nuisances.
LC_ALL=C
export LC_ALL
LANGUAGE=C
export LANGUAGE

# CDPATH.
(unset CDPATH) >/dev/null 2>&1 && unset CDPATH

if test "x$CONFIG_SHELL" = x; then
  as_bourne_compatible="if test -n \"\${ZSH_VERSION+set}\" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on \${1+\"\$@\"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '\${1+\"\$@\"}'='\"\$@\"'
  setopt NO_GLOB_SUBST
else
  case \`(set -o) 2>/dev/null\` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi
"
  as_required="as_fn_return () { (exit \$1); }
as_fn_success () { as_fn_return 0; }
as_fn_failure () { as_fn_return 1; }
as_fn_ret_success () { return 0; }
as_fn_ret_failure () { return 1; }

exitcode=0
as_fn_success || { exitcode=1; echo as_fn_success failed.; }
as_fn_failure && { exitcode=1; echo as_fn_failure succeeded.; }
as_fn_ret_success || { exitcode=1; echo as_fn_ret_success failed.; }
as_fn_ret_failure && { exitcode=1; echo as_fn_ret_failure succeeded.; }
if ( set x; as_fn_ret_success y && test x = \"\$1\" ); then :

else
  exitcode=1; echo positional parameters were not saved.
fi
test x\$exitcode = x0 || exit 1
test -x / || exit 1"
  as_suggested="  as_lineno_1=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_1a=\$LINENO
  as_lineno_2=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_2a=\$LINENO
  eval 'test \"x\$as_lineno_1'\$as_run'\" != \"x\$as_lineno_2'\$as_run'\" &&
  test \"x\`expr \$as_lineno_1'\$as_run' + 1\`\" = \"x\$as_lineno_2'\$as_run'\"' || exit 1
test \$(( 1 + 1 )) = 2 || exit 1"
  if (eval "$as_required") 2>/dev/null; then :
  as_have_required=yes
else
  as_have_required=no
fi
  if test x$as_have_required = xyes && (eval "$as_suggested") 2>/dev/null; then :

else
  as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
as_found=false
for as_dir in /bin$PATH_SEPARATOR/usr/bin$PATH_SEPARATOR$PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
  as_found=:
  case $as_dir in #(
	 /*)
	   for as_base in sh bash ksh sh5; do
	     # Try only shells that exist, to save several forks.
	     as_shell=$as_dir/$as_base
	     if { test -f "$as_shell" || test -f "$as_shell.exe"; } &&
		    { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$as_shell"; } 2>/dev/null; then :
  CONFIG_SHELL=$as_shell as_have_required=yes
		   if { $as_echo "$as_bourne_compatible""$as_suggested" | as_run=a "$as_shell"; } 2>/dev/null; then :
  break 2
fi
fi
	   done;;
       esac
  as_found=false
done
$as_found || { if { test -f "$SHELL" || test -f "$SHELL.exe"; } &&
	      { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$SHELL"; } 2>/dev/null; then :
  CONFIG_SHELL=$SHELL as_have_required=yes
fi; }
IFS=$as_save_IFS


      if test "x$CONFIG_SHELL" != x; then :
  export CONFIG_SHELL
             # We cannot yet assume a decent shell, so we have to provide a
# neutralization value for shells without unset; and this also
# works around shells that cannot unset nonexistent variables.
# Preserve -v and -x to the replacement shell.
BASH_ENV=/dev/null
ENV=/dev/null
(unset BASH_ENV) >/dev/null 2>&1 && unset BASH_ENV ENV
case $- in # ((((
  *v*x* | *x*v* ) as_opts=-vx ;;
  *v* ) as_opts=-v ;;
  *x* ) as_opts=-x ;;
  * ) as_opts= ;;
esac
exec $CONFIG_SHELL $as_opts "$as_myself" ${1+"$@"}
# Admittedly, this is quite paranoid, since all the known shells bail
# out after a failed `exec'.
$as_echo "$0: could not re-execute with $CONFIG_SHELL" >&2
exit 255
fi

    if test x$as_have_required = xno; then :
  $as_echo "$0: This script requires a shell more modern than all"
  $as_echo "$0: the shells that I found on your system."
  if test x${ZSH_VERSION+set} = xset ; then
    $as_echo "$0: In particular, zsh $ZSH_VERSION has bugs and should"
    $as_echo "$0: be upgraded to zsh 4.3.4 or later."
  else
    $as_echo "$0: Please tell bug-autoconf@gnu.org about your system,
$0: including any error possibly output before this
$0: message. Then install a modern shell, or manually run
$0: the script under such a shell if you do have one."
  fi
  exit 1
fi
fi
fi
SHELL=${CONFIG_SHELL-/bin/sh}
export SHELL
# Unset more variables known to interfere with behavior of common tools.
CLICOLOR_FORCE= GREP_OPTIONS=
unset CLICOLOR_FORCE GREP_OPTIONS

## --------------------- ##
## M4sh Shell Functions. ##
## --------------------- ##
# as_fn_unset VAR
# ---------------
# Portably unset VAR.
as_fn_unset ()
{
  { eval $1=; unset $1;}
}
as_unset=as_fn_unset

# as_fn_set_status STATUS
# -----------------------
# Set $? to STATUS, without forking.
as_fn_set_status ()
{
  return $1
} # as_fn_set_status

# as_fn_exit STATUS
# -----------------
# Exit the shell with STATUS, even in a "trap 0" or "set -e" context.
as_fn_exit ()
{
  set +e
  as_fn_set_status $1
  exit $1
} # as_fn_exit

# as_fn_mkdir_p
# -------------
# Create "$as_dir" as a directory, including parents if necessary.
as_fn_mkdir_p ()
{

  case $as_dir in #(
  -*) as_dir=./$as_dir;;
  esac
  test -d "$as_dir" || eval $as_mkdir_p || {
    as_dirs=
    while :; do
      case $as_dir in #(
      *\'*) as_qdir=`$as_echo "$as_dir" | sed "s/'/'\\\\\\\\''/g"`;; #'(
      *) as_qdir=$as_dir;;
      esac
      as_dirs="'$as_qdir' $as_dirs"
      as_dir=`$as_dirname -- "$as_dir" ||
$as_expr X"$as_dir" : 'X\(.*[^/]\)//*[^/][^/]*/*$' \| \
	 X"$as_dir" : 'X\(//\)[^/]' \| \
	 X"$as_dir" : 'X\(//\)$' \| \
	 X"$as_dir" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X"$as_dir" |
    sed '/^X\(.*[^/]\)\/\/*[^/][^/]*\/*$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)[^/].*/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`
      test -d "$as_dir" && break
    done
    test -z "$as_dirs" || eval "mkdir $as_dirs"
  } || test -d "$as_dir" || as_fn_error $? "cannot create directory $as_dir"


} # as_fn_mkdir_p

# as_fn_executable_p FILE
# -----------------------
# Test if FILE is an executable regular file.
as_fn_executable_p ()
{
  test -f "$1" && test -x "$1"
} # as_fn_executable_p
# as_fn_append VAR VALUE
# ----------------------
# Append the text in VALUE to the end of the definition contained in VAR. Take
# advantage of any shell optimizations that allow amortized linear growth over
# repeated appends, instead of the typical quadratic growth present in naive
# implementations.
if (eval "as_var=1; as_var+=2; test x\$as_var = x12") 2>/dev/null; then :
  eval 'as_fn_append ()
  {
    eval $1+=\$2
  }'
else
  as_fn_append ()
  {
    eval $1=\$$1\$2
  }
fi # as_fn_append

# as_fn_arith ARG...
# ------------------
# Perform arithmetic evaluation on the ARGs, and store the result in the
# global $as_val. Take advantage of shells that can avoid forks. The arguments
# must be portable across $(()) and expr.
if (eval "test \$(( 1 + 1 )) = 2") 2>/dev/null; then :
  eval 'as_fn_arith ()
  {
    as_val=$(( $* ))
  }'
else
  as_fn_arith ()
  {
    as_val=`expr "$@" || test $? -eq 1`
  }
fi # as_fn_arith


# as_fn_error STATUS ERROR [LINENO LOG_FD]
# ----------------------------------------
# Output "`basename $0`: error: ERROR" to stderr. If LINENO and LOG_FD are
# provided, also output the error to LOG_FD, referencing LINENO. Then exit the
# script with STATUS, using 1 if that was 0.
as_fn_error ()
{
  as_status=$1; test $as_status -eq 0 && as_status=1
  if test "$4"; then
    as_lineno=${as_lineno-"$3"} as_lineno_stack=as_lineno_stack=$as_lineno_stack
    $as_echo "$as_me:${as_lineno-$LINENO}: error: $2" >&$4
  fi
  $as_echo "$as_me: error: $2" >&2
  as_fn_exit $as_status
} # as_fn_error

if expr a : '\(a\)' >/dev/null 2>&1 &&
   test "X`expr 00001 : '.*\(...\)'`" = X001; then
  as_expr=expr
else
  as_expr=false
fi

if (basename -- /) >/dev/null 2>&1 && test "X`basename -- / 2>&1`" = "X/"; then
  as_basename=basename
else
  as_basename=false
fi

as_me=`$as_basename -- "$0" ||
$as_expr X/"$0" : '.*/\([^/][^/]*\)/*$' \| \
	 X"$0" : 'X\(//\)$' \| \
	 X"$0" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X/"$0" |
    sed '/^.*\/\([^/][^/]*\)\/*$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`

if (as_dir=`dirname -- /` && test "X$as_dir" = X/) >/dev/null 2>&1; then
  as_dirname=dirname
else
  as_dirname=false
fi

# Avoid depending upon Character Ranges.
as_cr_letters='abcdefghijklmnopqrstuvwxyz'
as_cr_LETTERS='ABCDEFGHIJKLMNOPQRSTUVWXYZ'
as_cr_Letters=$as_cr_letters$as_cr_LETTERS
as_cr_digits='0123456789'
as_cr_alnum=$as_cr_Letters$as_cr_digits


  as_lineno_1=$LINENO as_lineno_1a=$LINENO
  as_lineno_2=$LINENO as_lineno_2a=$LINENO
  eval 'test "x$as_lineno_1'$as_run'" != "x$as_lineno_2'$as_run'" &&
  test "x`expr $as_lineno_1'$as_run' + 1`" = "x$as_lineno_2'$as_run'"' || {
  # Blame Lee E. McMahon (1931-1989) for sed's syntax.  :-)
  sed -n '
    p
    /[$]LINENO/=
  ' <$as_myself |
    sed '
      s/[$]LINENO.*/&-/
      t lineno
      b
      :lineno
      N
      :loop
      s/[$]LINENO\([^'$as_cr_alnum'_].*\n\)\(.*\)/\2\1\2/
      t loop
      s/-\n.*//
    ' >$as_me.lineno &&
  chmod +x "$as_me.lineno" ||
    { $as_echo "$as_me: error: cannot create $as_me.lineno; rerun with a POSIX shell" >&2; as_fn_exit 1; }

  # If we had to re-execute with $CONFIG_SHELL, we're ensured to have
  # already done that, so ensure we don't try to do so again and fall
  # in an infinite loop.  This has already happened in practice.
  _as_can_reexec=no; export _as_can_reexec
  # Don't try to exec as it changes $[0], causing all sort of problems
  # (the dirname of $[0] is not the place where we might find the
  # original and so on.  Autoconf is especially sensitive to this).
  . "./$as_me.lineno"
  # Exit status is that of the last command.
  exit
}

ECHO_C= ECHO_N= ECHO_T=
case `echo -n x` in #(((((
-n*)
  case `echo 'xy\c'` in
  *c*) ECHO_T='	';;	# ECHO_T is single tab character.
  xy)  ECHO_C='\c';;
  *)   echo `echo ksh88 bug on AIX 6.1` > /dev/null
       ECHO_T='	';;
  esac;;
*)
  ECHO_N='-n';;
esac

rm -f conf$$ conf$$.exe conf$$.file
if test -d conf$$.dir; then
  rm -f conf$$.dir/conf$$.file
else
  rm -f conf$$.dir
  mkdir conf$$.dir 2>/dev/null
fi
if (echo >conf$$.file) 2>/dev/null; then
  if ln -s conf$$.file conf$$ 2>/dev/null; then
    as_ln_s='ln -s'
    # ... but there are two gotchas:
    # 1) On MSYS, both `ln -s file dir' and `ln file dir' fail.
    # 2) DJGPP < 2.04 has no symlinks; `ln -s' creates a wrapper executable.
    # In both cases, we have to default to `cp -pR'.
    ln -s conf$$.file conf$$.dir 2>/dev/null && test ! -f conf$$.exe ||
      as_ln_s='cp -pR'
  elif ln conf$$.file conf$$ 2>/dev/null; then
    as_ln_s=ln
  else
    as_ln_s='cp -pR'
  fi
else
  as_ln_s='cp -pR'
fi
rm -f conf$$ conf$$.exe conf$$.dir/conf$$.file conf$$.file
rmdir conf$$.dir 2>/dev/null

if mkdir -p . 2>/dev/null; then
  as_mkdir_p='mkdir -p "$as_dir"'
else
  test -d ./-p && rmdir ./-p
  as_mkdir_p=false
fi

as_test_x='test -x'
as_executable_p=as_fn_executable_p

# Sed expression to map a string onto a valid CPP name.
as_tr_cpp="eval sed 'y%*$as_cr_letters%P$as_cr_LETTERS%;s%[^_$as_cr_alnum]%_%g'"

# Sed expression to map a string onto a valid variable name.
as_tr_sh="eval sed 'y%*+%pp%;s%[^_$as_cr_alnum]%_%g'"





SHELL=${CONFIG_SHELL-/bin/sh}

# How were we run?
at_cli_args="$@"


# Not all shells have the 'times' builtin; the subshell is needed to make
# sure we discard the 'times: not found' message from the shell.
at_times_p=false
(times) >/dev/null 2>&1 && at_times_p=:

# CLI Arguments to pass to the debugging scripts.
at_debug_args=
# -e sets to true
at_errexit_p=false
# Shall we be verbose?  ':' means no, empty means yes.
at_verbose=:
at_quiet=
# Running several jobs in parallel, 0 means as many as test groups.
at_jobs=1
at_traceon=:
at_trace_echo=:
at_check_filter_trace=:

# Shall we keep the debug scripts?  Must be `:' when the suite is
# run by a debug script, so that the script doesn't remove itself.
at_debug_p=false
# Display help message?
at_help_p=false
# Display the version message?
at_version_p=false
# List test groups?
at_list_p=false
# --clean
at_clean=false
# Test groups to run
at_groups=
# Whether to rerun failed tests.
at_recheck=
# Whether a write failure occurred
at_write_fail=0

# The directory we run the suite in.  Default to . if no -C option.
at_dir=`pwd`
# An absolute reference to this testsuite script.
case $as_myself in
  [\\/]* | ?:[\\/]* ) at_myself=$as_myself ;;
  * ) at_myself=$at_dir/$as_myself ;;
esac
# Whether -C is in effect.
at_change_dir=false

# Whether to enable colored test results.
at_color=auto
# List of the tested programs.
at_tested=''
# As many question marks as there are digits in the last test group number.
# Used to normalize the test group numbers so that `ls' lists them in
# numerical order.
at_format='???'
# Description of all the test groups.
at_help_all="1;firewall-cmd.at:5;basic options;offline panic reload;
2;firewall-cmd.at:28;get/list options;offline zone service icmp;
3;firewall-cmd.at:44;default zone;offline zone;
4;firewall-cmd.at:56;user zone;offline zone;
5;firewall-cmd.at:76;zone interfaces;offline zone;
6;firewall-cmd.at:174;zone sources;offline zone;
7;firewall-cmd.at:226;services;offline service;
8;firewall-cmd.at:270;user services;offline service;
9;firewall-cmd.at:352;ports;offline port;
10;firewall-cmd.at:409;source ports;offline port;
11;firewall-cmd.at:446;protocols;offline protocol;
12;firewall-cmd.at:474;masquerade;offline masquerade nat;
13;firewall-cmd.at:501;forward;offline forward gh586 gh613;
14;firewall-cmd.at:689;forward ports;offline port forward_port;
15;firewall-cmd.at:788;ICMP block;offline icmp;
16;firewall-cmd.at:834;user ICMP types;offline icmp;
17;firewall-cmd.at:857;ipset;offline ipset rhbz1685256;
18;firewall-cmd.at:1054;user helpers;offline helper;
19;firewall-cmd.at:1082;direct;offline direct;
20;firewall-cmd.at:1156;direct nat;offline direct nat;
21;firewall-cmd.at:1181;direct passthrough;offline direct passthrough;
22;firewall-cmd.at:1219;direct ebtables;offline direct ebtables;
23;firewall-cmd.at:1265;lockdown;offline lockdown;
24;firewall-cmd.at:1332;rich rules good;offline rich;
25;firewall-cmd.at:1361;rich rules audit;offline rich;
26;firewall-cmd.at:1369;rich rules priority;offline rich;
27;firewall-cmd.at:1940;rich rules bad;offline rich;
28;firewall-cmd.at:1976;config validation;offline check_config;
29;rfc3964_ipv4.at:1;RFC3964_IPv4;offline rfc3964_ipv4;
30;service_include.at:1;service include;offline service xml gh273 rhbz1720300;
31;helpers_custom.at:1;customer helpers;offline helpers rhbz1733066 gh514 rhbz1769520;
32;policy.at:5;policy - xml;offline policy xml;
33;policy.at:73;policy - create;offline policy;
34;policy.at:90;policy - name;offline policy;
35;policy.at:103;policy - list;offline policy;
36;policy.at:225;policy - options;offline policy;
37;policy.at:284;policy - priority;offline policy;
38;policy.at:414;policy - zones;offline policy;
39;policy.at:601;policy - dispatch;offline policy;
40;policy.at:1911;policy - interfaces/sources;offline policy;
41;policy.at:2078;policy - target;offline policy;
42;policy.at:2127;policy - from file;offline policy;
43;services.at:1;services;offline policy service;
44;ports.at:1;ports;offline policy port;
45;source_ports.at:1;source ports;offline policy source_port;
46;forward_ports.at:1;forward ports;offline policy forward_port;
47;masquerade.at:1;masquerade;offline policy masquerade;
48;protocols.at:1;protocols;offline policy protocol;
49;rich_rules.at:1;rich rules;offline policy rich;
50;icmp_blocks.at:1;ICMP blocks;offline policy icmp_block;
51;rich_tcp_mss_clamp.at:5;tcp-mss-clamp;offline tcp-mss-clamp;
52;rich_destination_ipset.at:1;rich destination ipset;offline rich ipset;
53;zone.at:1;zone - target;offline zone;
54;rpfilter.at:1;rpfilter;offline rpfilter;
55;firewall-offline-cmd.at:19;lokkit migration;offline lokkit;
56;firewalld.conf.at:1;firewalld.conf;nftables dbus;
57;service.at:1;dbus api - services;nftables dbus service rhbz1721414 rhbz1737045 gh514;
58;zone_permanent_signatures.at:1;dbus api - zone permanent signatures;nftables dbus zone gh586 gh613;
59;zone_runtime_signatures.at:1;dbus api - zone runtime signatures;nftables dbus zone gh586 gh613;
60;zone_permanent_functional.at:1;dbus api - zone permanent functional;nftables dbus zone gh586 gh613;
61;zone_runtime_functional.at:1;dbus api - zone runtime functional;nftables dbus zone gh586 gh613;
62;policy_permanent_signatures.at:1;dbus api - policy permanent signatures;nftables dbus policy;
63;policy_runtime_signatures.at:1;dbus api - policy runtime signatures;nftables dbus policy;
64;policy_permanent_functional.at:1;dbus api - policy permanent functional;nftables dbus policy;
65;policy_runtime_functional.at:1;dbus api - policy runtime functional;nftables dbus policy;
66;direct.at:1;dbus api - direct signatures;nftables dbus direct;
67;firewall-cmd.at:5;basic options;nftables panic reload;
68;firewall-cmd.at:28;get/list options;nftables zone service icmp;
69;firewall-cmd.at:44;default zone;nftables zone;
70;firewall-cmd.at:56;user zone;nftables zone;
71;firewall-cmd.at:76;zone interfaces;nftables zone;
72;firewall-cmd.at:174;zone sources;nftables zone;
73;firewall-cmd.at:226;services;nftables service;
74;firewall-cmd.at:270;user services;nftables service;
75;firewall-cmd.at:352;ports;nftables port;
76;firewall-cmd.at:409;source ports;nftables port;
77;firewall-cmd.at:446;protocols;nftables protocol;
78;firewall-cmd.at:474;masquerade;nftables masquerade nat;
79;firewall-cmd.at:501;forward;nftables forward gh586 gh613;
80;firewall-cmd.at:689;forward ports;nftables port forward_port;
81;firewall-cmd.at:788;ICMP block;nftables icmp;
82;firewall-cmd.at:834;user ICMP types;nftables icmp;
83;firewall-cmd.at:857;ipset;nftables ipset rhbz1685256;
84;firewall-cmd.at:1054;user helpers;nftables helper;
85;firewall-cmd.at:1082;direct;nftables direct;
86;firewall-cmd.at:1156;direct nat;nftables direct nat;
87;firewall-cmd.at:1181;direct passthrough;nftables direct passthrough;
88;firewall-cmd.at:1219;direct ebtables;nftables direct ebtables;
89;firewall-cmd.at:1265;lockdown;nftables lockdown;
90;firewall-cmd.at:1332;rich rules good;nftables rich;
91;firewall-cmd.at:1361;rich rules audit;nftables rich;
92;firewall-cmd.at:1369;rich rules priority;nftables rich;
93;firewall-cmd.at:1940;rich rules bad;nftables rich;
94;firewall-cmd.at:1976;config validation;nftables check_config;
95;rhbz1514043.at:1;--set-log-denied does not zero config;nftables log_denied rhbz1514043;
96;rhbz1498923.at:1;invalid direct rule causes reload error;nftables direct reload rhbz1498923;
97;pr181.at:1;combined zones name length check;nftables zone gh181;
98;gh287.at:1;ICMP block inversion;nftables icmp gh287;
99;individual_calls.at:1;individual calls;nftables individual_calls;
100;rhbz1534571.at:3;rule deduplication;nftables rhbz1534571;
101;gh290.at:1;invalid syntax in xml files;nftables xml direct gh290;
102;gh290.at:19;invalid syntax in xml files;nftables xml zone gh290;
103;icmp_block_in_forward_chain.at:1;ICMP block not present FORWARD chain;nftables icmp;
104;pr323.at:1;GRE proto helper;nftables helper gh323;
105;rhbz1506742.at:1;ipset with timeout;nftables ipset rhbz1506742;
106;rhbz1594657.at:1;no log untracked passthrough queries;nftables direct passthrough rhbz1594657;
107;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;nftables log_denied rhbz1571957 icmp;
108;rhbz1404076.at:1;query single port added with range;nftables port rhbz1404076;
109;gh366.at:1;service destination multiple IP versions;nftables service gh366;
110;rhbz1601610.at:1;ipset duplicate entries;nftables ipset rhbz1601610;
111;gh303.at:1;unicode in XML;nftables xml unicode service gh303;
112;gh335.at:1;forward-port toaddr enables IP forwarding;nftables port forward_port gh335;
113;gh482.at:1;remove forward-port after reload;nftables gh482 rhbz1637675 rich forward_port;
114;gh478.at:1;rich rule marks every packet;nftables rich mark gh478;
115;gh453.at:1;nftables helper objects;nftables helper gh453;
116;gh258.at:1;zone dispatch layout;nftables zone gh258 gh441 rhbz1713823;
117;rhbz1715977.at:1;rich rule src/dst with service destination;nftables rich service rhbz1715977 rhbz1729097 rhbz1791783;
118;rhbz1723610.at:1;direct remove-rules per family;nftables direct rhbz1723610 gh385;
119;rhbz1734765.at:1;zone sources ordered by name;nftables zone rhbz1734765 rhbz1421222 gh166 rhbz1738545;
120;gh509.at:1;missing firewalld.conf file;nftables gh509;
121;gh567.at:1;rich rule source w/ mark action;nftables gh567 rich ipset;
122;rhbz1779835.at:1;ipv6 address with brackets;nftables rhbz1779835 ipset;
123;rhbz1779835.at:16;ipv6 address with brackets;nftables rhbz1779835 zone forward_port rich;
124;gh330.at:1;ipset cleanup on reload/stop;nftables ipset reload gh330 rhbz1682913 rhbz1790948 rhbz1809225;
125;gh599.at:1;writing to log after copytruncate;nftables gh599;
126;rhbz1843398.at:1;rich rule source mac;nftables rich rhbz1843398 gh643;
127;rhbz1839781.at:1;service RH-Satellite-6;nftables service rhbz1839781;
128;rhbz1689429.at:1;rich rule invalid priority;nftables rich rhbz1689429;
129;rhbz1483921.at:1;direct and zone mutually exclusive;nftables direct rhbz1483921;
130;rhbz1541077.at:1;hash:mac and family mutually exclusive;nftables ipset rhbz1541077;
131;rhbz1855140.at:1;rich rule icmptypes with one family;nftables rich icmp rhbz1855140;
132;rhbz1871298.at:1;rich rule parsing bottleneck;nftables rich offline rhbz1871298;
133;rhbz1596304.at:1;rich rules strip non-printable characters;nftables rich rhbz1596304;
134;gh703.at:1;add source with mac address;nftables gh703;
135;ipset_netmask_allowed.at:1;ipset netmask allowed type hash:ip;nftables ipset reload;
136;rhbz1940928.at:1;direct -s/-d multiple addresses;nftables direct rhbz1940928 rhbz1949552;
137;rhbz1936896.at:1;ipset type hash:net,net;nftables rhbz1936896;
138;gh795.at:1;ipset entry delete w/ timeout=0;nftables ipset gh794 gh795;
139;rhbz1914935.at:1;zone overlapping ports;nftables zone port rhbz1914935;
140;python.at:3;firewalld_test.py;nftables python;
141;python.at:8;firewalld_config.py;nftables python;
142;python.at:13;firewalld_rich.py;nftables python;
143;python.at:18;firewalld_direct.py;nftables python;
144;rfc3964_ipv4.at:1;RFC3964_IPv4;nftables rfc3964_ipv4;
145;service_include.at:1;service include;nftables service xml gh273 rhbz1720300;
146;helpers_custom.at:1;customer helpers;nftables helpers rhbz1733066 gh514 rhbz1769520;
147;policy.at:5;policy - xml;nftables policy xml;
148;policy.at:73;policy - create;nftables policy;
149;policy.at:90;policy - name;nftables policy;
150;policy.at:103;policy - list;nftables policy;
151;policy.at:225;policy - options;nftables policy;
152;policy.at:284;policy - priority;nftables policy;
153;policy.at:414;policy - zones;nftables policy;
154;policy.at:601;policy - dispatch;nftables policy;
155;policy.at:1911;policy - interfaces/sources;nftables policy;
156;policy.at:2078;policy - target;nftables policy;
157;policy.at:2127;policy - from file;nftables policy;
158;services.at:1;services;nftables policy service;
159;ports.at:1;ports;nftables policy port;
160;source_ports.at:1;source ports;nftables policy source_port;
161;forward_ports.at:1;forward ports;nftables policy forward_port;
162;masquerade.at:1;masquerade;nftables policy masquerade;
163;protocols.at:1;protocols;nftables policy protocol;
164;rich_rules.at:1;rich rules;nftables policy rich;
165;icmp_blocks.at:1;ICMP blocks;nftables policy icmp_block;
166;rich_tcp_mss_clamp.at:5;tcp-mss-clamp;nftables tcp-mss-clamp;
167;rich_destination_ipset.at:1;rich destination ipset;nftables rich ipset;
168;zone.at:1;zone - target;nftables zone;
169;rpfilter.at:1;rpfilter;nftables rpfilter;
170;firewall-cmd.at:5;basic options;iptables panic reload;
171;firewall-cmd.at:28;get/list options;iptables zone service icmp;
172;firewall-cmd.at:44;default zone;iptables zone;
173;firewall-cmd.at:56;user zone;iptables zone;
174;firewall-cmd.at:76;zone interfaces;iptables zone;
175;firewall-cmd.at:174;zone sources;iptables zone;
176;firewall-cmd.at:226;services;iptables service;
177;firewall-cmd.at:270;user services;iptables service;
178;firewall-cmd.at:352;ports;iptables port;
179;firewall-cmd.at:409;source ports;iptables port;
180;firewall-cmd.at:446;protocols;iptables protocol;
181;firewall-cmd.at:474;masquerade;iptables masquerade nat;
182;firewall-cmd.at:501;forward;iptables forward gh586 gh613;
183;firewall-cmd.at:689;forward ports;iptables port forward_port;
184;firewall-cmd.at:788;ICMP block;iptables icmp;
185;firewall-cmd.at:834;user ICMP types;iptables icmp;
186;firewall-cmd.at:857;ipset;iptables ipset rhbz1685256;
187;firewall-cmd.at:1054;user helpers;iptables helper;
188;firewall-cmd.at:1082;direct;iptables direct;
189;firewall-cmd.at:1156;direct nat;iptables direct nat;
190;firewall-cmd.at:1181;direct passthrough;iptables direct passthrough;
191;firewall-cmd.at:1219;direct ebtables;iptables direct ebtables;
192;firewall-cmd.at:1265;lockdown;iptables lockdown;
193;firewall-cmd.at:1332;rich rules good;iptables rich;
194;firewall-cmd.at:1361;rich rules audit;iptables rich;
195;firewall-cmd.at:1369;rich rules priority;iptables rich;
196;firewall-cmd.at:1940;rich rules bad;iptables rich;
197;firewall-cmd.at:1976;config validation;iptables check_config;
198;rhbz1514043.at:1;--set-log-denied does not zero config;iptables log_denied rhbz1514043;
199;rhbz1498923.at:1;invalid direct rule causes reload error;iptables direct reload rhbz1498923;
200;pr181.at:1;combined zones name length check;iptables zone gh181;
201;gh287.at:1;ICMP block inversion;iptables icmp gh287;
202;individual_calls.at:1;individual calls;iptables individual_calls;
203;rhbz1534571.at:3;rule deduplication;iptables rhbz1534571;
204;gh290.at:1;invalid syntax in xml files;iptables xml direct gh290;
205;gh290.at:19;invalid syntax in xml files;iptables xml zone gh290;
206;icmp_block_in_forward_chain.at:1;ICMP block not present FORWARD chain;iptables icmp;
207;pr323.at:1;GRE proto helper;iptables helper gh323;
208;rhbz1506742.at:1;ipset with timeout;iptables ipset rhbz1506742;
209;rhbz1594657.at:1;no log untracked passthrough queries;iptables direct passthrough rhbz1594657;
210;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;iptables log_denied rhbz1571957 icmp;
211;rhbz1404076.at:1;query single port added with range;iptables port rhbz1404076;
212;gh366.at:1;service destination multiple IP versions;iptables service gh366;
213;rhbz1601610.at:1;ipset duplicate entries;iptables ipset rhbz1601610;
214;gh303.at:1;unicode in XML;iptables xml unicode service gh303;
215;gh335.at:1;forward-port toaddr enables IP forwarding;iptables port forward_port gh335;
216;gh482.at:1;remove forward-port after reload;iptables gh482 rhbz1637675 rich forward_port;
217;gh478.at:1;rich rule marks every packet;iptables rich mark gh478;
218;gh258.at:1;zone dispatch layout;iptables zone gh258 gh441 rhbz1713823;
219;rhbz1715977.at:1;rich rule src/dst with service destination;iptables rich service rhbz1715977 rhbz1729097 rhbz1791783;
220;rhbz1723610.at:1;direct remove-rules per family;iptables direct rhbz1723610 gh385;
221;rhbz1734765.at:1;zone sources ordered by name;iptables zone rhbz1734765 rhbz1421222 gh166 rhbz1738545;
222;gh567.at:1;rich rule source w/ mark action;iptables gh567 rich ipset;
223;rhbz1779835.at:1;ipv6 address with brackets;iptables rhbz1779835 ipset;
224;rhbz1779835.at:16;ipv6 address with brackets;iptables rhbz1779835 zone forward_port rich;
225;gh330.at:1;ipset cleanup on reload/stop;iptables ipset reload gh330 rhbz1682913 rhbz1790948 rhbz1809225;
226;gh599.at:1;writing to log after copytruncate;iptables gh599;
227;rhbz1829104.at:1;direct rule in zone chain;iptables direct rhbz1829104;
228;rhbz1843398.at:1;rich rule source mac;iptables rich rhbz1843398 gh643;
229;rhbz1839781.at:1;service RH-Satellite-6;iptables service rhbz1839781;
230;rhbz1689429.at:1;rich rule invalid priority;iptables rich rhbz1689429;
231;rhbz1483921.at:1;direct and zone mutually exclusive;iptables direct rhbz1483921;
232;rhbz1541077.at:1;hash:mac and family mutually exclusive;iptables ipset rhbz1541077;
233;rhbz1855140.at:1;rich rule icmptypes with one family;iptables rich icmp rhbz1855140;
234;rhbz1871298.at:1;rich rule parsing bottleneck;iptables rich offline rhbz1871298;
235;rhbz1596304.at:1;rich rules strip non-printable characters;iptables rich rhbz1596304;
236;gh703.at:1;add source with mac address;iptables gh703;
237;ipset_netmask_allowed.at:1;ipset netmask allowed type hash:ip;iptables ipset reload;
238;rhbz1940928.at:1;direct -s/-d multiple addresses;iptables direct rhbz1940928 rhbz1949552;
239;rhbz1936896.at:1;ipset type hash:net,net;iptables rhbz1936896;
240;gh795.at:1;ipset entry delete w/ timeout=0;iptables ipset gh794 gh795;
241;rhbz1914935.at:1;zone overlapping ports;iptables zone port rhbz1914935;
242;python.at:3;firewalld_test.py;iptables python;
243;python.at:8;firewalld_config.py;iptables python;
244;python.at:13;firewalld_rich.py;iptables python;
245;python.at:18;firewalld_direct.py;iptables python;
246;rfc3964_ipv4.at:1;RFC3964_IPv4;iptables rfc3964_ipv4;
247;service_include.at:1;service include;iptables service xml gh273 rhbz1720300;
248;helpers_custom.at:1;customer helpers;iptables helpers rhbz1733066 gh514 rhbz1769520;
249;policy.at:5;policy - xml;iptables policy xml;
250;policy.at:73;policy - create;iptables policy;
251;policy.at:90;policy - name;iptables policy;
252;policy.at:103;policy - list;iptables policy;
253;policy.at:225;policy - options;iptables policy;
254;policy.at:284;policy - priority;iptables policy;
255;policy.at:414;policy - zones;iptables policy;
256;policy.at:601;policy - dispatch;iptables policy;
257;policy.at:1911;policy - interfaces/sources;iptables policy;
258;policy.at:2078;policy - target;iptables policy;
259;policy.at:2127;policy - from file;iptables policy;
260;services.at:1;services;iptables policy service;
261;ports.at:1;ports;iptables policy port;
262;source_ports.at:1;source ports;iptables policy source_port;
263;forward_ports.at:1;forward ports;iptables policy forward_port;
264;masquerade.at:1;masquerade;iptables policy masquerade;
265;protocols.at:1;protocols;iptables policy protocol;
266;rich_rules.at:1;rich rules;iptables policy rich;
267;icmp_blocks.at:1;ICMP blocks;iptables policy icmp_block;
268;rich_tcp_mss_clamp.at:5;tcp-mss-clamp;iptables tcp-mss-clamp;
269;rich_destination_ipset.at:1;rich destination ipset;iptables rich ipset;
270;zone.at:1;zone - target;iptables zone;
271;rpfilter.at:1;rpfilter;iptables rpfilter;
"
# List of the all the test groups.
at_groups_all=`$as_echo "$at_help_all" | sed 's/;.*//'`

# at_fn_validate_ranges NAME...
# -----------------------------
# Validate and normalize the test group number contained in each variable
# NAME. Leading zeroes are treated as decimal.
at_fn_validate_ranges ()
{
  for at_grp
  do
    eval at_value=\$$at_grp
    if test $at_value -lt 1 || test $at_value -gt 271; then
      $as_echo "invalid test group: $at_value" >&2
      exit 1
    fi
    case $at_value in
      0*) # We want to treat leading 0 as decimal, like expr and test, but
	  # AS_VAR_ARITH treats it as octal if it uses $(( )).
	  # With XSI shells, ${at_value#${at_value%%[1-9]*}} avoids the
	  # expr fork, but it is not worth the effort to determine if the
	  # shell supports XSI when the user can just avoid leading 0.
	  eval $at_grp='`expr $at_value + 0`' ;;
    esac
  done
}

at_prev=
for at_option
do
  # If the previous option needs an argument, assign it.
  if test -n "$at_prev"; then
    at_option=$at_prev=$at_option
    at_prev=
  fi

  case $at_option in
  *=?*) at_optarg=`expr "X$at_option" : '[^=]*=\(.*\)'` ;;
  *)    at_optarg= ;;
  esac

  # Accept the important Cygnus configure options, so we can diagnose typos.

  case $at_option in
    --help | -h )
	at_help_p=:
	;;

    --list | -l )
	at_list_p=:
	;;

    --version | -V )
	at_version_p=:
	;;

    --clean | -c )
	at_clean=:
	;;

    --color )
	at_color=always
	;;
    --color=* )
	case $at_optarg in
	no | never | none) at_color=never ;;
	auto | tty | if-tty) at_color=auto ;;
	always | yes | force) at_color=always ;;
	*) at_optname=`echo " $at_option" | sed 's/^ //; s/=.*//'`
	   as_fn_error $? "unrecognized argument to $at_optname: $at_optarg" ;;
	esac
	;;

    --debug | -d )
	at_debug_p=:
	;;

    --errexit | -e )
	at_debug_p=:
	at_errexit_p=:
	;;

    --verbose | -v )
	at_verbose=; at_quiet=:
	;;

    --trace | -x )
	at_traceon='set -x'
	at_trace_echo=echo
	at_check_filter_trace=at_fn_filter_trace
	;;

    [0-9] | [0-9][0-9] | [0-9][0-9][0-9] | [0-9][0-9][0-9][0-9])
	at_fn_validate_ranges at_option
	as_fn_append at_groups "$at_option$as_nl"
	;;

    # Ranges
    [0-9]- | [0-9][0-9]- | [0-9][0-9][0-9]- | [0-9][0-9][0-9][0-9]-)
	at_range_start=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_start
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,$p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    -[0-9] | -[0-9][0-9] | -[0-9][0-9][0-9] | -[0-9][0-9][0-9][0-9])
	at_range_end=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '1,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    [0-9]-[0-9] | [0-9]-[0-9][0-9] | [0-9]-[0-9][0-9][0-9] | \
    [0-9]-[0-9][0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9] | \
    [0-9][0-9]-[0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] )
	at_range_start=`expr $at_option : '\(.*\)-'`
	at_range_end=`expr $at_option : '.*-\(.*\)'`
	if test $at_range_start -gt $at_range_end; then
	  at_tmp=$at_range_end
	  at_range_end=$at_range_start
	  at_range_start=$at_tmp
	fi
	at_fn_validate_ranges at_range_start at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    # Directory selection.
    --directory | -C )
	at_prev=--directory
	;;
    --directory=* )
	at_change_dir=:
	at_dir=$at_optarg
	if test x- = "x$at_dir" ; then
	  at_dir=./-
	fi
	;;

    # Parallel execution.
    --jobs | -j )
	at_jobs=0
	;;
    --jobs=* | -j[0-9]* )
	if test -n "$at_optarg"; then
	  at_jobs=$at_optarg
	else
	  at_jobs=`expr X$at_option : 'X-j\(.*\)'`
	fi
	case $at_jobs in *[!0-9]*)
	  at_optname=`echo " $at_option" | sed 's/^ //; s/[0-9=].*//'`
	  as_fn_error $? "non-numeric argument to $at_optname: $at_jobs" ;;
	esac
	;;

    # Keywords.
    --keywords | -k )
	at_prev=--keywords
	;;
    --keywords=* )
	at_groups_selected=$at_help_all
	at_save_IFS=$IFS
	IFS=,
	set X $at_optarg
	shift
	IFS=$at_save_IFS
	for at_keyword
	do
	  at_invert=
	  case $at_keyword in
	  '!'*)
	    at_invert="-v"
	    at_keyword=`expr "X$at_keyword" : 'X!\(.*\)'`
	    ;;
	  esac
	  # It is on purpose that we match the test group titles too.
	  at_groups_selected=`$as_echo "$at_groups_selected" |
	      grep -i $at_invert "^[1-9][^;]*;.*[; ]$at_keyword[ ;]"`
	done
	# Smash the keywords.
	at_groups_selected=`$as_echo "$at_groups_selected" | sed 's/;.*//'`
	as_fn_append at_groups "$at_groups_selected$as_nl"
	;;
    --recheck)
	at_recheck=:
	;;

    *=*)
	at_envvar=`expr "x$at_option" : 'x\([^=]*\)='`
	# Reject names that are not valid shell variable names.
	case $at_envvar in
	  '' | [0-9]* | *[!_$as_cr_alnum]* )
	    as_fn_error $? "invalid variable name: \`$at_envvar'" ;;
	esac
	at_value=`$as_echo "$at_optarg" | sed "s/'/'\\\\\\\\''/g"`
	# Export now, but save eval for later and for debug scripts.
	export $at_envvar
	as_fn_append at_debug_args " $at_envvar='$at_value'"
	;;

     *) $as_echo "$as_me: invalid option: $at_option" >&2
	$as_echo "Try \`$0 --help' for more information." >&2
	exit 1
	;;
  esac
done

# Verify our last option didn't require an argument
if test -n "$at_prev"; then :
  as_fn_error $? "\`$at_prev' requires an argument"
fi

# The file containing the suite.
at_suite_log=$at_dir/$as_me.log

# Selected test groups.
if test -z "$at_groups$at_recheck"; then
  at_groups=$at_groups_all
else
  if test -n "$at_recheck" && test -r "$at_suite_log"; then
    at_oldfails=`sed -n '
      /^Failed tests:$/,/^Skipped tests:$/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^Unexpected passes:$/,/^## Detailed failed tests/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^## Detailed failed tests/q
      ' "$at_suite_log"`
    as_fn_append at_groups "$at_oldfails$as_nl"
  fi
  # Sort the tests, removing duplicates.
  at_groups=`$as_echo "$at_groups" | sort -nu | sed '/^$/d'`
fi

if test x"$at_color" = xalways \
   || { test x"$at_color" = xauto && test -t 1; }; then
  at_red=`printf '\033[0;31m'`
  at_grn=`printf '\033[0;32m'`
  at_lgn=`printf '\033[1;32m'`
  at_blu=`printf '\033[1;34m'`
  at_std=`printf '\033[m'`
else
  at_red= at_grn= at_lgn= at_blu= at_std=
fi

# Help message.
if $at_help_p; then
  cat <<_ATEOF || at_write_fail=1
Usage: $0 [OPTION]... [VARIABLE=VALUE]... [TESTS]

Run all the tests, or the selected TESTS, given by numeric ranges, and
save a detailed log file.  Upon failure, create debugging scripts.

Do not change environment variables directly.  Instead, set them via
command line arguments.  Set \`AUTOTEST_PATH' to select the executables
to exercise.  Each relative directory is expanded as build and source
directories relative to the top level of this distribution.
E.g., from within the build directory /tmp/foo-1.0, invoking this:

  $ $0 AUTOTEST_PATH=bin

is equivalent to the following, assuming the source directory is /src/foo-1.0:

  PATH=/tmp/foo-1.0/bin:/src/foo-1.0/bin:\$PATH $0
_ATEOF
cat <<_ATEOF || at_write_fail=1

Operation modes:
  -h, --help     print the help message, then exit
  -V, --version  print version number, then exit
  -c, --clean    remove all the files this test suite might create and exit
  -l, --list     describes all the tests, or the selected TESTS
_ATEOF
cat <<_ATEOF || at_write_fail=1

Execution tuning:
  -C, --directory=DIR
                 change to directory DIR before starting
      --color[=never|auto|always]
                 disable colored test results, or enable even without terminal
  -j, --jobs[=N]
                 Allow N jobs at once; infinite jobs with no arg (default 1)
  -k, --keywords=KEYWORDS
                 select the tests matching all the comma-separated KEYWORDS
                 multiple \`-k' accumulate; prefixed \`!' negates a KEYWORD
      --recheck  select all tests that failed or passed unexpectedly last time
  -e, --errexit  abort as soon as a test fails; implies --debug
  -v, --verbose  force more detailed output
                 default for debugging scripts
  -d, --debug    inhibit clean up and top-level logging
                 default for debugging scripts
  -x, --trace    enable tests shell tracing
_ATEOF
cat <<_ATEOF || at_write_fail=1

Report bugs to <https://github.com/firewalld/firewalld>.
firewalld home page: <http://firewalld.org/>.
_ATEOF
  exit $at_write_fail
fi

# List of tests.
if $at_list_p; then
  cat <<_ATEOF || at_write_fail=1
firewalld 1.0.0 test suite test groups:

 NUM: FILE-NAME:LINE     TEST-GROUP-NAME
      KEYWORDS

_ATEOF
  # Pass an empty line as separator between selected groups and help.
  $as_echo "$at_groups$as_nl$as_nl$at_help_all" |
    awk 'NF == 1 && FS != ";" {
	   selected[$ 1] = 1
	   next
	 }
	 /^$/ { FS = ";" }
	 NF > 0 {
	   if (selected[$ 1]) {
	     printf " %3d: %-18s %s\n", $ 1, $ 2, $ 3
	     if ($ 4) {
	       lmax = 79
	       indent = "     "
	       line = indent
	       len = length (line)
	       n = split ($ 4, a, " ")
	       for (i = 1; i <= n; i++) {
		 l = length (a[i]) + 1
		 if (i > 1 && len + l > lmax) {
		   print line
		   line = indent " " a[i]
		   len = length (line)
		 } else {
		   line = line " " a[i]
		   len += l
		 }
	       }
	       if (n)
		 print line
	     }
	   }
	 }' || at_write_fail=1
  exit $at_write_fail
fi
if $at_version_p; then
  $as_echo "$as_me (firewalld 1.0.0)" &&
  cat <<\_ATEOF || at_write_fail=1

Copyright (C) 2012 Free Software Foundation, Inc.
This test suite is free software; the Free Software Foundation gives
unlimited permission to copy, distribute and modify it.
_ATEOF
  exit $at_write_fail
fi

# Should we print banners?  Yes if more than one test is run.
case $at_groups in #(
  *$as_nl* )
      at_print_banners=: ;; #(
  * ) at_print_banners=false ;;
esac
# Text for banner N, set to a single space once printed.
# Banner 1. firewall-offline-cmd.at:1
# Category starts at test group 1.
at_banner_text_1="firewall-offline-cmd"
# Banner 2. features.at:1
# Category starts at test group 29.
at_banner_text_2="features (offline)"
# Banner 3. dbus.at:1
# Category starts at test group 56.
at_banner_text_3="dbus"
# Banner 4. firewall-cmd.at:1
# Category starts at test group 67.
at_banner_text_4="firewall-cmd (nftables)"
# Banner 5. regression.at:1
# Category starts at test group 95.
at_banner_text_5="regression (nftables)"
# Banner 6. python.at:1
# Category starts at test group 140.
at_banner_text_6="python (nftables)"
# Banner 7. features.at:1
# Category starts at test group 144.
at_banner_text_7="features (nftables)"
# Banner 8. firewall-cmd.at:1
# Category starts at test group 170.
at_banner_text_8="firewall-cmd (iptables)"
# Banner 9. regression.at:1
# Category starts at test group 198.
at_banner_text_9="regression (iptables)"
# Banner 10. python.at:1
# Category starts at test group 242.
at_banner_text_10="python (iptables)"
# Banner 11. features.at:1
# Category starts at test group 246.
at_banner_text_11="features (iptables)"

# Take any -C into account.
if $at_change_dir ; then
  test x != "x$at_dir" && cd "$at_dir" \
    || as_fn_error $? "unable to change directory"
  at_dir=`pwd`
fi

# Load the config files for any default variable assignments.
for at_file in atconfig atlocal
do
  test -r $at_file || continue
  . ./$at_file || as_fn_error $? "invalid content: $at_file"
done

# Autoconf <=2.59b set at_top_builddir instead of at_top_build_prefix:
: "${at_top_build_prefix=$at_top_builddir}"

# Perform any assignments requested during argument parsing.
eval "$at_debug_args"

# atconfig delivers names relative to the directory the test suite is
# in, but the groups themselves are run in testsuite-dir/group-dir.
if test -n "$at_top_srcdir"; then
  builddir=../..
  for at_dir_var in srcdir top_srcdir top_build_prefix
  do
    eval at_val=\$at_$at_dir_var
    case $at_val in
      [\\/$]* | ?:[\\/]* ) at_prefix= ;;
      *) at_prefix=../../ ;;
    esac
    eval "$at_dir_var=\$at_prefix\$at_val"
  done
fi

## -------------------- ##
## Directory structure. ##
## -------------------- ##

# This is the set of directories and files used by this script
# (non-literals are capitalized):
#
# TESTSUITE         - the testsuite
# TESTSUITE.log     - summarizes the complete testsuite run
# TESTSUITE.dir/    - created during a run, remains after -d or failed test
# + at-groups/      - during a run: status of all groups in run
# | + NNN/          - during a run: meta-data about test group NNN
# | | + check-line  - location (source file and line) of current AT_CHECK
# | | + status      - exit status of current AT_CHECK
# | | + stdout      - stdout of current AT_CHECK
# | | + stder1      - stderr, including trace
# | | + stderr      - stderr, with trace filtered out
# | | + test-source - portion of testsuite that defines group
# | | + times       - timestamps for computing duration
# | | + pass        - created if group passed
# | | + xpass       - created if group xpassed
# | | + fail        - created if group failed
# | | + xfail       - created if group xfailed
# | | + skip        - created if group skipped
# + at-stop         - during a run: end the run if this file exists
# + at-source-lines - during a run: cache of TESTSUITE line numbers for extraction
# + 0..NNN/         - created for each group NNN, remains after -d or failed test
# | + TESTSUITE.log - summarizes the group results
# | + ...           - files created during the group

# The directory the whole suite works in.
# Should be absolute to let the user `cd' at will.
at_suite_dir=$at_dir/$as_me.dir
# The file containing the suite ($at_dir might have changed since earlier).
at_suite_log=$at_dir/$as_me.log
# The directory containing helper files per test group.
at_helper_dir=$at_suite_dir/at-groups
# Stop file: if it exists, do not start new jobs.
at_stop_file=$at_suite_dir/at-stop
# The fifo used for the job dispatcher.
at_job_fifo=$at_suite_dir/at-job-fifo

if $at_clean; then
  test -d "$at_suite_dir" &&
    find "$at_suite_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
  rm -f -r "$at_suite_dir" "$at_suite_log"
  exit $?
fi

# Don't take risks: use only absolute directories in PATH.
#
# For stand-alone test suites (ie. atconfig was not found),
# AUTOTEST_PATH is relative to `.'.
#
# For embedded test suites, AUTOTEST_PATH is relative to the top level
# of the package.  Then expand it into build/src parts, since users
# may create executables in both places.
AUTOTEST_PATH=`$as_echo "$AUTOTEST_PATH" | sed "s|:|$PATH_SEPARATOR|g"`
at_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $AUTOTEST_PATH $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -n "$at_path" && as_fn_append at_path $PATH_SEPARATOR
case $as_dir in
  [\\/]* | ?:[\\/]* )
    as_fn_append at_path "$as_dir"
    ;;
  * )
    if test -z "$at_top_build_prefix"; then
      # Stand-alone test suite.
      as_fn_append at_path "$as_dir"
    else
      # Embedded test suite.
      as_fn_append at_path "$at_top_build_prefix$as_dir$PATH_SEPARATOR"
      as_fn_append at_path "$at_top_srcdir/$as_dir"
    fi
    ;;
esac
  done
IFS=$as_save_IFS


# Now build and simplify PATH.
#
# There might be directories that don't exist, but don't redirect
# builtins' (eg., cd) stderr directly: Ultrix's sh hates that.
at_new_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $at_path
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -d "$as_dir" || continue
case $as_dir in
  [\\/]* | ?:[\\/]* ) ;;
  * ) as_dir=`(cd "$as_dir" && pwd) 2>/dev/null` ;;
esac
case $PATH_SEPARATOR$at_new_path$PATH_SEPARATOR in
  *$PATH_SEPARATOR$as_dir$PATH_SEPARATOR*) ;;
  $PATH_SEPARATOR$PATH_SEPARATOR) at_new_path=$as_dir ;;
  *) as_fn_append at_new_path "$PATH_SEPARATOR$as_dir" ;;
esac
  done
IFS=$as_save_IFS

PATH=$at_new_path
export PATH

# Setting up the FDs.



# 5 is the log file.  Not to be overwritten if `-d'.
if $at_debug_p; then
  at_suite_log=/dev/null
else
  : >"$at_suite_log"
fi
exec 5>>"$at_suite_log"

# Banners and logs.
$as_echo "## --------------------------- ##
## firewalld 1.0.0 test suite. ##
## --------------------------- ##"
{
  $as_echo "## --------------------------- ##
## firewalld 1.0.0 test suite. ##
## --------------------------- ##"
  echo

  $as_echo "$as_me: command line was:"
  $as_echo "  \$ $0 $at_cli_args"
  echo

  # If ChangeLog exists, list a few lines in case it might help determining
  # the exact version.
  if test -n "$at_top_srcdir" && test -f "$at_top_srcdir/ChangeLog"; then
    $as_echo "## ---------- ##
## ChangeLog. ##
## ---------- ##"
    echo
    sed 's/^/| /;10q' "$at_top_srcdir/ChangeLog"
    echo
  fi

  {
cat <<_ASUNAME
## --------- ##
## Platform. ##
## --------- ##

hostname = `(hostname || uname -n) 2>/dev/null | sed 1q`
uname -m = `(uname -m) 2>/dev/null || echo unknown`
uname -r = `(uname -r) 2>/dev/null || echo unknown`
uname -s = `(uname -s) 2>/dev/null || echo unknown`
uname -v = `(uname -v) 2>/dev/null || echo unknown`

/usr/bin/uname -p = `(/usr/bin/uname -p) 2>/dev/null || echo unknown`
/bin/uname -X     = `(/bin/uname -X) 2>/dev/null     || echo unknown`

/bin/arch              = `(/bin/arch) 2>/dev/null              || echo unknown`
/usr/bin/arch -k       = `(/usr/bin/arch -k) 2>/dev/null       || echo unknown`
/usr/convex/getsysinfo = `(/usr/convex/getsysinfo) 2>/dev/null || echo unknown`
/usr/bin/hostinfo      = `(/usr/bin/hostinfo) 2>/dev/null      || echo unknown`
/bin/machine           = `(/bin/machine) 2>/dev/null           || echo unknown`
/usr/bin/oslevel       = `(/usr/bin/oslevel) 2>/dev/null       || echo unknown`
/bin/universe          = `(/bin/universe) 2>/dev/null          || echo unknown`

_ASUNAME

as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    $as_echo "PATH: $as_dir"
  done
IFS=$as_save_IFS

}
  echo

  # Contents of the config files.
  for at_file in atconfig atlocal
  do
    test -r $at_file || continue
    $as_echo "$as_me: $at_file:"
    sed 's/^/| /' $at_file
    echo
  done
} >&5


## ------------------------- ##
## Autotest shell functions. ##
## ------------------------- ##

# at_fn_banner NUMBER
# -------------------
# Output banner NUMBER, provided the testsuite is running multiple groups and
# this particular banner has not yet been printed.
at_fn_banner ()
{
  $at_print_banners || return 0
  eval at_banner_text=\$at_banner_text_$1
  test "x$at_banner_text" = "x " && return 0
  eval "at_banner_text_$1=\" \""
  if test -z "$at_banner_text"; then
    $at_first || echo
  else
    $as_echo "$as_nl$at_banner_text$as_nl"
  fi
} # at_fn_banner

# at_fn_check_prepare_notrace REASON LINE
# ---------------------------------------
# Perform AT_CHECK preparations for the command at LINE for an untraceable
# command; REASON is the reason for disabling tracing.
at_fn_check_prepare_notrace ()
{
  $at_trace_echo "Not enabling shell tracing (command contains $1)"
  $as_echo "$2" >"$at_check_line_file"
  at_check_trace=: at_check_filter=:
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_trace LINE
# ------------------------------
# Perform AT_CHECK preparations for the command at LINE for a traceable
# command.
at_fn_check_prepare_trace ()
{
  $as_echo "$1" >"$at_check_line_file"
  at_check_trace=$at_traceon at_check_filter=$at_check_filter_trace
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_dynamic COMMAND LINE
# ----------------------------------------
# Decide if COMMAND at LINE is traceable at runtime, and call the appropriate
# preparation function.
at_fn_check_prepare_dynamic ()
{
  case $1 in
    *$as_nl*)
      at_fn_check_prepare_notrace 'an embedded newline' "$2" ;;
    *)
      at_fn_check_prepare_trace "$2" ;;
  esac
}

# at_fn_filter_trace
# ------------------
# Remove the lines in the file "$at_stderr" generated by "set -x" and print
# them to stderr.
at_fn_filter_trace ()
{
  mv "$at_stderr" "$at_stder1"
  grep '^ *+' "$at_stder1" >&2
  grep -v '^ *+' "$at_stder1" >"$at_stderr"
}

# at_fn_log_failure FILE-LIST
# ---------------------------
# Copy the files in the list on stdout with a "> " prefix, and exit the shell
# with a failure exit code.
at_fn_log_failure ()
{
  for file
    do $as_echo "$file:"; sed 's/^/> /' "$file"; done
  echo 1 > "$at_status_file"
  exit 1
}

# at_fn_check_skip EXIT-CODE LINE
# -------------------------------
# Check whether EXIT-CODE is a special exit code (77 or 99), and if so exit
# the test group subshell with that same exit code. Use LINE in any report
# about test failure.
at_fn_check_skip ()
{
  case $1 in
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$2: hard failure"; exit 99;;
    77) echo 77 > "$at_status_file"; exit 77;;
  esac
}

# at_fn_check_status EXPECTED EXIT-CODE LINE
# ------------------------------------------
# Check whether EXIT-CODE is the EXPECTED exit code, and if so do nothing.
# Otherwise, if it is 77 or 99, exit the test group subshell with that same
# exit code; if it is anything else print an error message referring to LINE,
# and fail the test.
at_fn_check_status ()
{
  case $2 in
    $1 ) ;;
    77) echo 77 > "$at_status_file"; exit 77;;
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$3: hard failure"; exit 99;;
    *) $as_echo "$3: exit code was $2, expected $1"
      at_failed=:;;
  esac
}

# at_fn_diff_devnull FILE
# -----------------------
# Emit a diff between /dev/null and FILE. Uses "test -s" to avoid useless diff
# invocations.
at_fn_diff_devnull ()
{
  test -s "$1" || return 0
  $at_diff "$at_devnull" "$1"
}

# at_fn_test NUMBER
# -----------------
# Parse out test NUMBER from the tail of this file.
at_fn_test ()
{
  eval at_sed=\$at_sed$1
  sed "$at_sed" "$at_myself" > "$at_test_source"
}

# at_fn_create_debugging_script
# -----------------------------
# Create the debugging script $at_group_dir/run which will reproduce the
# current test group.
at_fn_create_debugging_script ()
{
  {
    echo "#! /bin/sh" &&
    echo 'test "${ZSH_VERSION+set}" = set && alias -g '\''${1+"$@"}'\''='\''"$@"'\''' &&
    $as_echo "cd '$at_dir'" &&
    $as_echo "exec \${CONFIG_SHELL-$SHELL} \"$at_myself\" -v -d $at_debug_args $at_group \${1+\"\$@\"}" &&
    echo 'exit 1'
  } >"$at_group_dir/run" &&
  chmod +x "$at_group_dir/run"
}

## -------------------------------- ##
## End of autotest shell functions. ##
## -------------------------------- ##
{
  $as_echo "## ---------------- ##
## Tested programs. ##
## ---------------- ##"
  echo
} >&5

# Report what programs are being tested.
for at_program in : $at_tested
do
  test "$at_program" = : && continue
  case $at_program in
    [\\/]* | ?:[\\/]* ) $at_program_=$at_program ;;
    * )
    as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -f "$as_dir/$at_program" && break
  done
IFS=$as_save_IFS

    at_program_=$as_dir/$at_program ;;
  esac
  if test -f "$at_program_"; then
    {
      $as_echo "$at_srcdir/testsuite.at:1: $at_program_ --version"
      "$at_program_" --version </dev/null
      echo
    } >&5 2>&1
  else
    as_fn_error $? "cannot find $at_program" "$LINENO" 5
  fi
done

{
  $as_echo "## ------------------ ##
## Running the tests. ##
## ------------------ ##"
} >&5

at_start_date=`date`
at_start_time=`date +%s 2>/dev/null`
$as_echo "$as_me: starting at: $at_start_date" >&5

# Create the master directory if it doesn't already exist.
as_dir="$at_suite_dir"; as_fn_mkdir_p ||
  as_fn_error $? "cannot create \`$at_suite_dir'" "$LINENO" 5

# Can we diff with `/dev/null'?  DU 5.0 refuses.
if diff /dev/null /dev/null >/dev/null 2>&1; then
  at_devnull=/dev/null
else
  at_devnull=$at_suite_dir/devnull
  >"$at_devnull"
fi

# Use `diff -u' when possible.
if at_diff=`diff -u "$at_devnull" "$at_devnull" 2>&1` && test -z "$at_diff"
then
  at_diff='diff -u'
else
  at_diff=diff
fi

# Get the last needed group.
for at_group in : $at_groups; do :; done

# Extract the start and end lines of each test group at the tail
# of this file
awk '
BEGIN { FS="" }
/^#AT_START_/ {
  start = NR
}
/^#AT_STOP_/ {
  test = substr ($ 0, 10)
  print "at_sed" test "=\"1," start "d;" (NR-1) "q\""
  if (test == "'"$at_group"'") exit
}' "$at_myself" > "$at_suite_dir/at-source-lines" &&
. "$at_suite_dir/at-source-lines" ||
  as_fn_error $? "cannot create test line number cache" "$LINENO" 5
rm -f "$at_suite_dir/at-source-lines"

# Set number of jobs for `-j'; avoid more jobs than test groups.
set X $at_groups; shift; at_max_jobs=$#
if test $at_max_jobs -eq 0; then
  at_jobs=1
fi
if test $at_jobs -ne 1 &&
   { test $at_jobs -eq 0 || test $at_jobs -gt $at_max_jobs; }; then
  at_jobs=$at_max_jobs
fi

# If parallel mode, don't output banners, don't split summary lines.
if test $at_jobs -ne 1; then
  at_print_banners=false
  at_quiet=:
fi

# Set up helper dirs.
rm -rf "$at_helper_dir" &&
mkdir "$at_helper_dir" &&
cd "$at_helper_dir" &&
{ test -z "$at_groups" || mkdir $at_groups; } ||
as_fn_error $? "testsuite directory setup failed" "$LINENO" 5

# Functions for running a test group.  We leave the actual
# test group execution outside of a shell function in order
# to avoid hitting zsh 4.x exit status bugs.

# at_fn_group_prepare
# -------------------
# Prepare for running a test group.
at_fn_group_prepare ()
{
  # The directory for additional per-group helper files.
  at_job_dir=$at_helper_dir/$at_group
  # The file containing the location of the last AT_CHECK.
  at_check_line_file=$at_job_dir/check-line
  # The file containing the exit status of the last command.
  at_status_file=$at_job_dir/status
  # The files containing the output of the tested commands.
  at_stdout=$at_job_dir/stdout
  at_stder1=$at_job_dir/stder1
  at_stderr=$at_job_dir/stderr
  # The file containing the code for a test group.
  at_test_source=$at_job_dir/test-source
  # The file containing dates.
  at_times_file=$at_job_dir/times

  # Be sure to come back to the top test directory.
  cd "$at_suite_dir"

  # Clearly separate the test groups when verbose.
  $at_first || $at_verbose echo

  at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'


  # Create a fresh directory for the next test group, and enter.
  # If one already exists, the user may have invoked ./run from
  # within that directory; we remove the contents, but not the
  # directory itself, so that we aren't pulling the rug out from
  # under the shell's notion of the current directory.
  at_group_dir=$at_suite_dir/$at_group_normalized
  at_group_log=$at_group_dir/$as_me.log
  if test -d "$at_group_dir"; then
  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx {} \;
  rm -fr "$at_group_dir"/* "$at_group_dir"/.[!.] "$at_group_dir"/.??*
fi ||
    { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: test directory for $at_group_normalized could not be cleaned" >&5
$as_echo "$as_me: WARNING: test directory for $at_group_normalized could not be cleaned" >&2;}
  # Be tolerant if the above `rm' was not able to remove the directory.
  as_dir="$at_group_dir"; as_fn_mkdir_p

  echo 0 > "$at_status_file"

  # In verbose mode, append to the log file *and* show on
  # the standard output; in quiet mode only write to the log.
  if test -z "$at_verbose"; then
    at_tee_pipe='tee -a "$at_group_log"'
  else
    at_tee_pipe='cat >> "$at_group_log"'
  fi
}

# at_fn_group_banner ORDINAL LINE DESC PAD [BANNER]
# -------------------------------------------------
# Declare the test group ORDINAL, located at LINE with group description DESC,
# and residing under BANNER. Use PAD to align the status column.
at_fn_group_banner ()
{
  at_setup_line="$2"
  test -n "$5" && at_fn_banner $5
  at_desc="$3"
  case $1 in
    [0-9])      at_desc_line="  $1: ";;
    [0-9][0-9]) at_desc_line=" $1: " ;;
    *)          at_desc_line="$1: "  ;;
  esac
  as_fn_append at_desc_line "$3$4"
  $at_quiet $as_echo_n "$at_desc_line"
  echo "#                             -*- compilation -*-" >> "$at_group_log"
}

# at_fn_group_postprocess
# -----------------------
# Perform cleanup after running a test group.
at_fn_group_postprocess ()
{
  # Be sure to come back to the suite directory, in particular
  # since below we might `rm' the group directory we are in currently.
  cd "$at_suite_dir"

  if test ! -f "$at_check_line_file"; then
    sed "s/^ */$as_me: WARNING: /" <<_ATEOF
      A failure happened in a test group before any test could be
      run. This means that test suite is improperly designed.  Please
      report this failure to <https://github.com/firewalld/firewalld>.
_ATEOF
    $as_echo "$at_setup_line" >"$at_check_line_file"
    at_status=99
  fi
  $at_verbose $as_echo_n "$at_group. $at_setup_line: "
  $as_echo_n "$at_group. $at_setup_line: " >> "$at_group_log"
  case $at_xfail:$at_status in
    yes:0)
	at_msg="UNEXPECTED PASS"
	at_res=xpass
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    no:0)
	at_msg="ok"
	at_res=pass
	at_errexit=false
	at_color=$at_grn
	;;
    *:77)
	at_msg='skipped ('`cat "$at_check_line_file"`')'
	at_res=skip
	at_errexit=false
	at_color=$at_blu
	;;
    no:* | *:99)
	at_msg='FAILED ('`cat "$at_check_line_file"`')'
	at_res=fail
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    yes:*)
	at_msg='expected failure ('`cat "$at_check_line_file"`')'
	at_res=xfail
	at_errexit=false
	at_color=$at_lgn
	;;
  esac
  echo "$at_res" > "$at_job_dir/$at_res"
  # In parallel mode, output the summary line only afterwards.
  if test $at_jobs -ne 1 && test -n "$at_verbose"; then
    $as_echo "$at_desc_line $at_color$at_msg$at_std"
  else
    # Make sure there is a separator even with long titles.
    $as_echo " $at_color$at_msg$at_std"
  fi
  at_log_msg="$at_group. $at_desc ($at_setup_line): $at_msg"
  case $at_status in
    0|77)
      # $at_times_file is only available if the group succeeded.
      # We're not including the group log, so the success message
      # is written in the global log separately.  But we also
      # write to the group log in case they're using -d.
      if test -f "$at_times_file"; then
	at_log_msg="$at_log_msg     ("`sed 1d "$at_times_file"`')'
	rm -f "$at_times_file"
      fi
      $as_echo "$at_log_msg" >> "$at_group_log"
      $as_echo "$at_log_msg" >&5

      # Cleanup the group directory, unless the user wants the files
      # or the success was unexpected.
      if $at_debug_p || test $at_res = xpass; then
	at_fn_create_debugging_script
	if test $at_res = xpass && $at_errexit; then
	  echo stop > "$at_stop_file"
	fi
      else
	if test -d "$at_group_dir"; then
	  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
	  rm -fr "$at_group_dir"
	fi
	rm -f "$at_test_source"
      fi
      ;;
    *)
      # Upon failure, include the log into the testsuite's global
      # log.  The failure message is written in the group log.  It
      # is later included in the global log.
      $as_echo "$at_log_msg" >> "$at_group_log"

      # Upon failure, keep the group directory for autopsy, and create
      # the debugging script.  With -e, do not start any further tests.
      at_fn_create_debugging_script
      if $at_errexit; then
	echo stop > "$at_stop_file"
      fi
      ;;
  esac
}


## ------------ ##
## Driver loop. ##
## ------------ ##


if (set -m && set +m && set +b) >/dev/null 2>&1; then
  set +b
  at_job_control_on='set -m' at_job_control_off='set +m' at_job_group=-
else
  at_job_control_on=: at_job_control_off=: at_job_group=
fi

for at_signal in 1 2 15; do
  trap 'set +x; set +e
	$at_job_control_off
	at_signal='"$at_signal"'
	echo stop > "$at_stop_file"
	trap "" $at_signal
	at_pgids=
	for at_pgid in `jobs -p 2>/dev/null`; do
	  at_pgids="$at_pgids $at_job_group$at_pgid"
	done
	test -z "$at_pgids" || kill -$at_signal $at_pgids 2>/dev/null
	wait
	if test "$at_jobs" -eq 1 || test -z "$at_verbose"; then
	  echo >&2
	fi
	at_signame=`kill -l $at_signal 2>&1 || echo $at_signal`
	set x $at_signame
	test 0 -gt 2 && at_signame=$at_signal
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: caught signal $at_signame, bailing out" >&5
$as_echo "$as_me: WARNING: caught signal $at_signame, bailing out" >&2;}
	as_fn_arith 128 + $at_signal && exit_status=$as_val
	as_fn_exit $exit_status' $at_signal
done

rm -f "$at_stop_file"
at_first=:

if test $at_jobs -ne 1 &&
     rm -f "$at_job_fifo" &&
     test -n "$at_job_group" &&
     ( mkfifo "$at_job_fifo" && trap 'exit 1' PIPE STOP TSTP ) 2>/dev/null
then
  # FIFO job dispatcher.

  trap 'at_pids=
	for at_pid in `jobs -p`; do
	  at_pids="$at_pids $at_job_group$at_pid"
	done
	if test -n "$at_pids"; then
	  at_sig=TSTP
	  test "${TMOUT+set}" = set && at_sig=STOP
	  kill -$at_sig $at_pids 2>/dev/null
	fi
	kill -STOP $$
	test -z "$at_pids" || kill -CONT $at_pids 2>/dev/null' TSTP

  echo
  # Turn jobs into a list of numbers, starting from 1.
  at_joblist=`$as_echo "$at_groups" | sed -n 1,${at_jobs}p`

  set X $at_joblist
  shift
  for at_group in $at_groups; do
    $at_job_control_on 2>/dev/null
    (
      # Start one test group.
      $at_job_control_off
      if $at_first; then
	exec 7>"$at_job_fifo"
      else
	exec 6<&-
      fi
      trap 'set +x; set +e
	    trap "" PIPE
	    echo stop > "$at_stop_file"
	    echo >&7
	    as_fn_exit 141' PIPE
      at_fn_group_prepare
      if cd "$at_group_dir" &&
	 at_fn_test $at_group &&
	 . "$at_test_source"
      then :; else
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
	at_failed=:
      fi
      at_fn_group_postprocess
      echo >&7
    ) &
    $at_job_control_off
    if $at_first; then
      at_first=false
      exec 6<"$at_job_fifo" 7>"$at_job_fifo"
    fi
    shift # Consume one token.
    if test $# -gt 0; then :; else
      read at_token <&6 || break
      set x $*
    fi
    test -f "$at_stop_file" && break
  done
  exec 7>&-
  # Read back the remaining ($at_jobs - 1) tokens.
  set X $at_joblist
  shift
  if test $# -gt 0; then
    shift
    for at_job
    do
      read at_token
    done <&6
  fi
  exec 6<&-
  wait
else
  # Run serially, avoid forks and other potential surprises.
  for at_group in $at_groups; do
    at_fn_group_prepare
    if cd "$at_group_dir" &&
       at_fn_test $at_group &&
       . "$at_test_source"; then :; else
      { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
      at_failed=:
    fi
    at_fn_group_postprocess
    test -f "$at_stop_file" && break
    at_first=false
  done
fi

# Wrap up the test suite with summary statistics.
cd "$at_helper_dir"

# Use ?..???? when the list must remain sorted, the faster * otherwise.
at_pass_list=`for f in */pass; do echo $f; done | sed '/\*/d; s,/pass,,'`
at_skip_list=`for f in */skip; do echo $f; done | sed '/\*/d; s,/skip,,'`
at_xfail_list=`for f in */xfail; do echo $f; done | sed '/\*/d; s,/xfail,,'`
at_xpass_list=`for f in ?/xpass ??/xpass ???/xpass ????/xpass; do
		 echo $f; done | sed '/?/d; s,/xpass,,'`
at_fail_list=`for f in ?/fail ??/fail ???/fail ????/fail; do
		echo $f; done | sed '/?/d; s,/fail,,'`

set X $at_pass_list $at_xpass_list $at_xfail_list $at_fail_list $at_skip_list
shift; at_group_count=$#
set X $at_xpass_list; shift; at_xpass_count=$#; at_xpass_list=$*
set X $at_xfail_list; shift; at_xfail_count=$#
set X $at_fail_list; shift; at_fail_count=$#; at_fail_list=$*
set X $at_skip_list; shift; at_skip_count=$#

as_fn_arith $at_group_count - $at_skip_count && at_run_count=$as_val
as_fn_arith $at_xpass_count + $at_fail_count && at_unexpected_count=$as_val
as_fn_arith $at_xfail_count + $at_fail_count && at_total_fail_count=$as_val

# Back to the top directory.
cd "$at_dir"
rm -rf "$at_helper_dir"

# Compute the duration of the suite.
at_stop_date=`date`
at_stop_time=`date +%s 2>/dev/null`
$as_echo "$as_me: ending at: $at_stop_date" >&5
case $at_start_time,$at_stop_time in
  [0-9]*,[0-9]*)
    as_fn_arith $at_stop_time - $at_start_time && at_duration_s=$as_val
    as_fn_arith $at_duration_s / 60 && at_duration_m=$as_val
    as_fn_arith $at_duration_m / 60 && at_duration_h=$as_val
    as_fn_arith $at_duration_s % 60 && at_duration_s=$as_val
    as_fn_arith $at_duration_m % 60 && at_duration_m=$as_val
    at_duration="${at_duration_h}h ${at_duration_m}m ${at_duration_s}s"
    $as_echo "$as_me: test suite duration: $at_duration" >&5
    ;;
esac

echo
$as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
echo
{
  echo
  $as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
  echo
} >&5

if test $at_run_count = 1; then
  at_result="1 test"
  at_were=was
else
  at_result="$at_run_count tests"
  at_were=were
fi
if $at_errexit_p && test $at_unexpected_count != 0; then
  if test $at_xpass_count = 1; then
    at_result="$at_result $at_were run, one passed"
  else
    at_result="$at_result $at_were run, one failed"
  fi
  at_result="$at_result unexpectedly and inhibited subsequent tests."
  at_color=$at_red
else
  # Don't you just love exponential explosion of the number of cases?
  at_color=$at_red
  case $at_xpass_count:$at_fail_count:$at_xfail_count in
    # So far, so good.
    0:0:0) at_result="$at_result $at_were successful." at_color=$at_grn ;;
    0:0:*) at_result="$at_result behaved as expected." at_color=$at_lgn ;;

    # Some unexpected failures
    0:*:0) at_result="$at_result $at_were run,
$at_fail_count failed unexpectedly." ;;

    # Some failures, both expected and unexpected
    0:*:1) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    0:*:*) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;

    # No unexpected failures, but some xpasses
    *:0:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly." ;;

    # No expected failures, but failures and xpasses
    *:1:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failure)." ;;
    *:*:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failures)." ;;

    # All of them.
    *:*:1) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    *:*:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;
  esac

  if test $at_skip_count = 0 && test $at_run_count -gt 1; then
    at_result="All $at_result"
  fi
fi

# Now put skips in the mix.
case $at_skip_count in
  0) ;;
  1) at_result="$at_result
1 test was skipped." ;;
  *) at_result="$at_result
$at_skip_count tests were skipped." ;;
esac

if test $at_unexpected_count = 0; then
  echo "$at_color$at_result$at_std"
  echo "$at_result" >&5
else
  echo "${at_color}ERROR: $at_result$at_std" >&2
  echo "ERROR: $at_result" >&5
  {
    echo
    $as_echo "## ------------------------ ##
## Summary of the failures. ##
## ------------------------ ##"

    # Summary of failed and skipped tests.
    if test $at_fail_count != 0; then
      echo "Failed tests:"
      $SHELL "$at_myself" $at_fail_list --list
      echo
    fi
    if test $at_skip_count != 0; then
      echo "Skipped tests:"
      $SHELL "$at_myself" $at_skip_list --list
      echo
    fi
    if test $at_xpass_count != 0; then
      echo "Unexpected passes:"
      $SHELL "$at_myself" $at_xpass_list --list
      echo
    fi
    if test $at_fail_count != 0; then
      $as_echo "## ---------------------- ##
## Detailed failed tests. ##
## ---------------------- ##"
      echo
      for at_group in $at_fail_list
      do
	at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'

	cat "$at_suite_dir/$at_group_normalized/$as_me.log"
	echo
      done
      echo
    fi
    if test -n "$at_top_srcdir"; then
      sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## ${at_top_build_prefix}config.log ##
_ASBOX
      sed 's/^/| /' ${at_top_build_prefix}config.log
      echo
    fi
  } >&5

  sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## $as_me.log was created. ##
_ASBOX

  echo
  if $at_debug_p; then
    at_msg='per-test log files'
  else
    at_msg="\`${at_testdir+${at_testdir}/}$as_me.log'"
  fi
  $as_echo "Please send $at_msg and all information you think might help:

   To: <https://github.com/firewalld/firewalld>
   Subject: [firewalld 1.0.0] $as_me: $at_fail_list${at_fail_list:+ failed${at_xpass_list:+, }}$at_xpass_list${at_xpass_list:+ passed unexpectedly}

You may investigate any problem if you feel able to do so, in which
case the test suite provides a good starting point.  Its output may
be found below \`${at_testdir+${at_testdir}/}$as_me.dir'.
"
  exit 1
fi

exit 0

## ------------- ##
## Actual tests. ##
## ------------- ##
#AT_START_1
at_fn_group_banner 1 'firewall-cmd.at:5' \
  "basic options" "                                  " 1
at_xfail=no
(
  $as_echo "1. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 " "firewall-cmd.at:17"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_1
#AT_START_2
at_fn_group_banner 2 'firewall-cmd.at:28' \
  "get/list options" "                               " 1
at_xfail=no
(
  $as_echo "2. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 " "firewall-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 " "firewall-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 " "firewall-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 " "firewall-cmd.at:40"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 " "firewall-cmd.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_2
#AT_START_3
at_fn_group_banner 3 'firewall-cmd.at:44' \
  "default zone" "                                   " 1
at_xfail=no
(
  $as_echo "3. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\"" "firewall-cmd.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:50"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\"" "firewall-cmd.at:52"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone" "firewall-cmd.at:53"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_3
#AT_START_4
at_fn_group_banner 4 'firewall-cmd.at:56' \
  "user zone" "                                      " 1
at_xfail=no
(
  $as_echo "4. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 " "firewall-cmd.at:60"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 " "firewall-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 " "firewall-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 " "firewall-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "firewall-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 " "firewall-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghi                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghi                 " "firewall-cmd.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:72: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghij                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghij                 " "firewall-cmd.at:72"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-zone=123456789abcefghij
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/firewall-cmd.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_4
#AT_START_5
at_fn_group_banner 5 'firewall-cmd.at:76' \
  "zone interfaces" "                                " 1
at_xfail=no
(
  $as_echo "5. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:76"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone" "firewall-cmd.at:108"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone" "firewall-cmd.at:109"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 " "firewall-cmd.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 " "firewall-cmd.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:115: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:115"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:117: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 " "firewall-cmd.at:117"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 " "firewall-cmd.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:124"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:127"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:129"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:130"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:132"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:133"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 " "firewall-cmd.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:139: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted" "firewall-cmd.at:139"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:140"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:146: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public" "firewall-cmd.at:146"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }























































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 " "firewall-cmd.at:169"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 " "firewall-cmd.at:170"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_5
#AT_START_6
at_fn_group_banner 6 'firewall-cmd.at:174' \
  "zone sources" "                                   " 1
at_xfail=no
(
  $as_echo "6. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:174"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 " "firewall-cmd.at:215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 " "firewall-cmd.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 " "firewall-cmd.at:217"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }













      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_6
#AT_START_7
at_fn_group_banner 7 'firewall-cmd.at:226' \
  "services" "                                       " 1
at_xfail=no
(
  $as_echo "7. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:238: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 " "firewall-cmd.at:238"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:239: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 " "firewall-cmd.at:239"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:241: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 " "firewall-cmd.at:241"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 " "firewall-cmd.at:242"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 " "firewall-cmd.at:247"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 " "firewall-cmd.at:248"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 " "firewall-cmd.at:249"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:258: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 " "firewall-cmd.at:258"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:259: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 " "firewall-cmd.at:259"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:260: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 " "firewall-cmd.at:260"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 " "firewall-cmd.at:261"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:266: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 " "firewall-cmd.at:266"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 " "firewall-cmd.at:267"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_7
#AT_START_8
at_fn_group_banner 8 'firewall-cmd.at:270' \
  "user services" "                                  " 1
at_xfail=no
(
  $as_echo "8. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 " "firewall-cmd.at:273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 " "firewall-cmd.at:275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:276"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 " "firewall-cmd.at:278"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 " "firewall-cmd.at:279"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 " "firewall-cmd.at:280"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 " "firewall-cmd.at:281"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 " "firewall-cmd.at:282"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:283"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 " "firewall-cmd.at:284"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:285"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:286"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 " "firewall-cmd.at:287"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 " "firewall-cmd.at:288"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 " "firewall-cmd.at:289"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:290"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:291: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 " "firewall-cmd.at:291"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 " "firewall-cmd.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 " "firewall-cmd.at:293"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:294"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:295"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:298"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:299: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:299"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 " "firewall-cmd.at:300"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 " "firewall-cmd.at:301"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:302"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:303"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 " "firewall-cmd.at:305"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:306: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 " "firewall-cmd.at:306"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 " "firewall-cmd.at:307"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:308"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 " "firewall-cmd.at:309"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:310"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:312: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=sip                 " "firewall-cmd.at:312"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:312"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:313: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=sip                 " "firewall-cmd.at:313"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:314: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=ftp                 " "firewall-cmd.at:314"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:315: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 " "firewall-cmd.at:315"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:315"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:316: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --get-service-helpers                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --get-service-helpers                 " "firewall-cmd.at:316"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --get-service-helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=ftp                 " "firewall-cmd.at:319"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp                 " "firewall-cmd.at:320"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:322: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 " "firewall-cmd.at:322"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:322"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:324: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 " "firewall-cmd.at:324"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:325: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 " "firewall-cmd.at:325"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:326"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:326"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 " "firewall-cmd.at:326"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:326"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:333: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 " "firewall-cmd.at:333"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:334: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:334"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:334"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 " "firewall-cmd.at:335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:336: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:336"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:338: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 " "firewall-cmd.at:338"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:338: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:338"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }





_ATEOF




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_8
#AT_START_9
at_fn_group_banner 9 'firewall-cmd.at:352' \
  "ports" "                                          " 1
at_xfail=no
(
  $as_echo "9. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
























































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 " "firewall-cmd.at:376"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 " "firewall-cmd.at:377"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:378: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 " "firewall-cmd.at:378"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 " "firewall-cmd.at:379"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 " "firewall-cmd.at:380"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:381"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 " "firewall-cmd.at:382"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:383"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:385: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 " "firewall-cmd.at:385"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 " "firewall-cmd.at:386"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 " "firewall-cmd.at:387"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 " "firewall-cmd.at:388"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 " "firewall-cmd.at:389"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 " "firewall-cmd.at:390"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 " "firewall-cmd.at:391"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:392: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 " "firewall-cmd.at:392"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 " "firewall-cmd.at:401"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 " "firewall-cmd.at:402"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:403"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 " "firewall-cmd.at:404"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 " "firewall-cmd.at:405"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:406"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_9
#AT_START_10
at_fn_group_banner 10 'firewall-cmd.at:409' \
  "source ports" "                                   " 1
at_xfail=no
(
  $as_echo "10. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:422: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 " "firewall-cmd.at:422"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 " "firewall-cmd.at:423"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 " "firewall-cmd.at:424"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 " "firewall-cmd.at:425"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 " "firewall-cmd.at:426"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:427"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 " "firewall-cmd.at:428"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:429: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:429"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 " "firewall-cmd.at:438"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 " "firewall-cmd.at:439"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:440"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 " "firewall-cmd.at:441"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 " "firewall-cmd.at:442"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:443"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_10
#AT_START_11
at_fn_group_banner 11 'firewall-cmd.at:446' \
  "protocols" "                                      " 1
at_xfail=no
(
  $as_echo "11. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 " "firewall-cmd.at:454"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 " "firewall-cmd.at:455"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:456"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:457: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 " "firewall-cmd.at:457"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:458: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:458"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:466: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:466"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 " "firewall-cmd.at:467"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:468"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:469: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 " "firewall-cmd.at:469"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:470: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 " "firewall-cmd.at:470"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:471"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_11
#AT_START_12
at_fn_group_banner 12 'firewall-cmd.at:474' \
  "masquerade" "                                     " 1
at_xfail=no
(
  $as_echo "12. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:474"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi














































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 " "firewall-cmd.at:495"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:496"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:497: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 " "firewall-cmd.at:497"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:498"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_12
#AT_START_13
at_fn_group_banner 13 'firewall-cmd.at:501' \
  "forward" "                                        " 1
at_xfail=no
(
  $as_echo "13. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

























































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --add-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --add-forward                 " "firewall-cmd.at:574"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-interface=dummy --add-interface=dummy3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-interface=dummy --add-interface=dummy3                 " "firewall-cmd.at:575"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-interface=dummy --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-source=10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-source=10.10.10.0/24                 " "firewall-cmd.at:576"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:578: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 " "firewall-cmd.at:578"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }




























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:597: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --remove-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --remove-forward                 " "firewall-cmd.at:597"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward                 " "firewall-cmd.at:598"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:599: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-interface=dummy --remove-interface=dummy3                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-interface=dummy --remove-interface=dummy3                 " "firewall-cmd.at:599"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:600: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-source=10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-source=10.10.10.0/24                 " "firewall-cmd.at:600"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=home --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:600"
$at_failed && at_fn_log_failure
$at_traceon; }















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone |grep public"
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:604"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone |grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }













































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_13
#AT_START_14
at_fn_group_banner 14 'firewall-cmd.at:689' \
  "forward ports" "                                  " 1
at_xfail=no
(
  $as_echo "14. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 " "firewall-cmd.at:759"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:760: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 " "firewall-cmd.at:760"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:761: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 " "firewall-cmd.at:761"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:761"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 " "firewall-cmd.at:762"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 " "firewall-cmd.at:763"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 " "firewall-cmd.at:764"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:765"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:766"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:767"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:768"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:769"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:770"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:771"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:772"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:773"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 " "firewall-cmd.at:773"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:773"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:773"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:779"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 " "firewall-cmd.at:780"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 " "firewall-cmd.at:781"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:782"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:783"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:784: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:784"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:784"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 " "firewall-cmd.at:785"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_14
#AT_START_15
at_fn_group_banner 15 'firewall-cmd.at:788' \
  "ICMP block" "                                     " 1
at_xfail=no
(
  $as_echo "15. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:798: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 " "firewall-cmd.at:798"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:798"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 " "firewall-cmd.at:799"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:800: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:800"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 " "firewall-cmd.at:801"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:802"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }




































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 " "firewall-cmd.at:808"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:809"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 " "firewall-cmd.at:810"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:811"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }





































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 " "firewall-cmd.at:826"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:827"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:828"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:829: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 " "firewall-cmd.at:829"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:829"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:830: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:830"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:831"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_15
#AT_START_16
at_fn_group_banner 16 'firewall-cmd.at:834' \
  "user ICMP types" "                                " 1
at_xfail=no
(
  $as_echo "16. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:834"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 " "firewall-cmd.at:837"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 " "firewall-cmd.at:839"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:840"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 " "firewall-cmd.at:842"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:843"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:844"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:845"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:846: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:846"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:846"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:847"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:848"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 " "firewall-cmd.at:850"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:851"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:853: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 " "firewall-cmd.at:853"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:853"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:854"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_16
#AT_START_17
at_fn_group_banner 17 'firewall-cmd.at:857' \
  "ipset" "                                          " 1
at_xfail=no
(
  $as_echo "17. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:863: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 " "firewall-cmd.at:863"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:863"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:881"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:885"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234                 " "firewall-cmd.at:886"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,2000-2100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,2000-2100                 " "firewall-cmd.at:887"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,2000-2100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }




























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:900"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:904"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 " "firewall-cmd.at:905"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002                 " "firewall-cmd.at:906"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }


























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:940"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:944: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,mark                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,mark                 " "firewall-cmd.at:944"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,mark
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:944"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,0x100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,0x100                 " "firewall-cmd.at:945"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,0x100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }














































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:974"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:978: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,port                 " "firewall-cmd.at:978"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:978"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234                 " "firewall-cmd.at:979"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:982: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:982"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:982"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port,net                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port,net                 " "firewall-cmd.at:986"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24                 " "firewall-cmd.at:987"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:1007"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,iface                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,iface                 " "firewall-cmd.at:1011"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:net,iface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,foobar0                 " "firewall-cmd.at:1012"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.0/24,foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }














































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1041: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:1041"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1041"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 " "firewall-cmd.at:1044"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 " "firewall-cmd.at:1044"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:1044"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }



































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_17
#AT_START_18
at_fn_group_banner 18 'firewall-cmd.at:1054' \
  "user helpers" "                                   " 1
at_xfail=no
(
  $as_echo "18. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1054"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1057: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 " "firewall-cmd.at:1057"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:1057"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1058: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 " "firewall-cmd.at:1058"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1058"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1059: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1059"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1059"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1060: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1060"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1060"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1061: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 " "firewall-cmd.at:1061"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1061"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1062: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 " "firewall-cmd.at:1062"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1062"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1063"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1064: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 " "firewall-cmd.at:1064"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1064"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1066: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 " "firewall-cmd.at:1066"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1066"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1068: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:1068"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 " "firewall-cmd.at:1071"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1072: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1072"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1072"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1073: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:1073"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1074: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 " "firewall-cmd.at:1074"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1074"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1075: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:1075"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1075"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1076: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:1076"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1076"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1078: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 " "firewall-cmd.at:1078"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1078"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1079: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1079"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1079"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_18
#AT_START_19
at_fn_group_banner 19 'firewall-cmd.at:1082' \
  "direct" "                                         " 1
at_xfail=no
(
  $as_echo "19. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1082"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































































































































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1126: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone" "firewall-cmd.at:1126"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1126"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 " "firewall-cmd.at:1128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1131"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1132: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep \"žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1132"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1132"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1133: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep \"ipv4 filter žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1133"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1133"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1136"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1137: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1137"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1137"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1138: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1138"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1138"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1139: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1139"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1139"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:1140"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:1142"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1151: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 " "firewall-cmd.at:1151"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1151"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_19
#AT_START_20
at_fn_group_banner 20 'firewall-cmd.at:1156' \
  "direct nat" "                                     " 1
at_xfail=no
(
  $as_echo "20. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1156"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1164: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:1164"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1164"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1165"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1168: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:1168"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1168"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1169: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:1169"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1169"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1170"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:1174"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_20
#AT_START_21
at_fn_group_banner 21 'firewall-cmd.at:1181' \
  "direct passthrough" "                             " 1
at_xfail=no
(
  $as_echo "21. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
























































































































    if $IP6TABLES -L >/dev/null 2>&1; then
        :






























































    else
        :

    fi






















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1209: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 " "firewall-cmd.at:1209"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1209"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 " "firewall-cmd.at:1210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 " "firewall-cmd.at:1211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep \"\\-nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1213: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1213"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1213"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:1214"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1215: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 " "firewall-cmd.at:1215"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1215"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:1216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_21
#AT_START_22
at_fn_group_banner 22 'firewall-cmd.at:1219' \
  "direct ebtables" "                                " 1
at_xfail=no
(
  $as_echo "22. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1219"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
















































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1255: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 " "firewall-cmd.at:1255"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1255"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1256"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1257: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 " "firewall-cmd.at:1257"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1257"
$at_failed && at_fn_log_failure
$at_traceon; }




































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_22
#AT_START_23
at_fn_group_banner 23 'firewall-cmd.at:1265' \
  "lockdown" "                                       " 1
at_xfail=no
(
  $as_echo "23. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1273"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1274"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep \"/usr/bin/command\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1275"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1276: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1276"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1276"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1277: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:1277"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1277"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1284"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1285"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1286: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1286"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1286"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1287: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1287"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1287"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1288: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:1288"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1288"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1296"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1297"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1298: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep \"6666\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1298"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1298"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1299"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1300: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:1300"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1300"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1301: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 " "firewall-cmd.at:1301"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1308: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1308"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1309: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1309"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1310: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep \"theboss\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:1310"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1310"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1312: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:1312"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1312"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "firewall-cmd.at:1314" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1314"






























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_23
#AT_START_24
at_fn_group_banner 24 'firewall-cmd.at:1332' \
  "rich rules good" "                                " 1
at_xfail=no
(
  $as_echo "24. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1332"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:1335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1336"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1336"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1336"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:1336"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1337"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1337"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1337"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:1337"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1338"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1338"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1338"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:1338"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1339"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1339"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1339"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:1339"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:1340"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:1348"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:1349"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1350"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:1351"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:1352"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1353"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:1354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:1355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1359"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1359"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1359"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:1359"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_24
#AT_START_25
at_fn_group_banner 25 'firewall-cmd.at:1361' \
  "rich rules audit" "                               " 1
at_xfail=no
(
  $as_echo "25. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1361"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi








































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:1365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_25
#AT_START_26
at_fn_group_banner 26 'firewall-cmd.at:1369' \
  "rich rules priority" "                            " 1
at_xfail=no
(
  $as_echo "26. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1369"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1538: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1538"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1538"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1539: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1539"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1539"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1540: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1540"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1540"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1541: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1541"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1541"
$at_failed && at_fn_log_failure
$at_traceon; }



































































































































































































































































































































































































































































































































































































































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_26
#AT_START_27
at_fn_group_banner 27 'firewall-cmd.at:1940' \
  "rich rules bad" "                                 " 1
at_xfail=no
(
  $as_echo "27. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1940"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 " "firewall-cmd.at:1947"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 " "firewall-cmd.at:1948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 " "firewall-cmd.at:1949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 " "firewall-cmd.at:1950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 " "firewall-cmd.at:1951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 " "firewall-cmd.at:1952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 " "firewall-cmd.at:1953"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 " "firewall-cmd.at:1954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 " "firewall-cmd.at:1955"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 " "firewall-cmd.at:1956"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 " "firewall-cmd.at:1957"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 " "firewall-cmd.at:1958"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 " "firewall-cmd.at:1959"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 " "firewall-cmd.at:1960"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 " "firewall-cmd.at:1961"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1961"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1961"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 " "firewall-cmd.at:1966"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 " "firewall-cmd.at:1967"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 " "firewall-cmd.at:1968"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 " "firewall-cmd.at:1969"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_27
#AT_START_28
at_fn_group_banner 28 'firewall-cmd.at:1976' \
  "config validation" "                              " 1
at_xfail=no
(
  $as_echo "28. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1976"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1980: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1980"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1980"
$at_failed && at_fn_log_failure
$at_traceon; }







        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1985: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1985"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1985"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1986: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1986"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1986"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1987: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1987"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "ERROR: Invalid option: 'SomeBogusField=yes'
ERROR: Invalid option: 'SomeBogusField=yes'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1987"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1992: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1992"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1992"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2001: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2001"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2001"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2009"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2010: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2010"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2010"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2019: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2019"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2019"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2027: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2027"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2027"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2035: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2035"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2035"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2036: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2036"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2036"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2039: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:2039"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2039"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2046: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2046"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2046"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2058: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2058"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2058"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2065: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2065"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:2065"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2066: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2066"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2066"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2069: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:2069"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2069"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2075: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2075"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2075"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2082: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2082"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2082"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2084: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2084"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2084"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2093: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2093"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2096: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:2096"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2096"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2103"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2111: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2111"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2111"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2112: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2112"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2112"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2115: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:2115"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2115"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2122"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2130: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2130"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2130"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2138: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2138"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2138"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2146: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2146"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2146"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2154: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2154"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2154"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2162: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2162"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2162"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2171: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2171"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2171"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2179: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2179"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2179"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2180: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2180"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2180"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2183: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:2183"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2183"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2187: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2187"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:2187"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2195: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2195"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:2195"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2203: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2203"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2203"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2211"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2219: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2219"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2219"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2227: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2227"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2227"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2235: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2235"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2235"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2243: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2243"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2243"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2251: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2251"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2251"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2259: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2259"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2259"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2267: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2267"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2267"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid source: No address no ipset.
WARNING: Invalid source: No address no ipset.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2275"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2290: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2290"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2290"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2303: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2303"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2303"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2318: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2318"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid log level
WARNING: Invalid rule: Invalid log level
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2318"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2333: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2333"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2333"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2335: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:2335"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2351: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2351"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2351"
$at_failed && at_fn_log_failure
$at_traceon; }




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_28
#AT_START_29
at_fn_group_banner 29 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 2
at_xfail=no
(
  $as_echo "29. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }












































{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:74: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:74"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_29
#AT_START_30
at_fn_group_banner 30 'service_include.at:1' \
  "service include" "                                " 2
at_xfail=no
(
  $as_echo "30. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:61: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=recursive-service                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=recursive-service                 " "service_include.at:61"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=ssh                 " "service_include.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 " "service_include.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=ssh                 " "service_include.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh                 " "service_include.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --get-includes                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --get-includes                 " "service_include.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:96: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:96"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:99: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:99"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:115: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=drop --add-interface=foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=drop --add-interface=foobar0                 " "service_include.at:115"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:116: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=drop --add-service=my-service-with-include                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=drop --add-service=my-service-with-include                 " "service_include.at:116"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:117: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=does-not-exist                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=does-not-exist                 " "service_include.at:117"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }


























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=does-not-exist                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=does-not-exist                 " "service_include.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }


































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_30
#AT_START_31
at_fn_group_banner 31 'helpers_custom.at:1' \
  "customer helpers" "                               " 2
at_xfail=no
(
  $as_echo "31. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\"                 " "helpers_custom.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --helper=ftptest --add-port=\"2121/tcp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --helper=ftptest --add-port=\"2121/tcp\"                 " "helpers_custom.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-service=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-service=\"ftptest\"                 " "helpers_custom.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 " "helpers_custom.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 " "helpers_custom.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"2121/tcp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"2121/tcp\"                 " "helpers_custom.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-module=\"ftptest\"                 " "helpers_custom.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module=\"ftptest\"                 " "helpers_custom.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/helpers_custom.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftptest\"                 " "helpers_custom.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:116: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module=\"ftptest\"                 " "helpers_custom.at:116"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:117: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-helper=\"ftptest\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-helper=\"ftptest\"                 " "helpers_custom.at:117"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --remove-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:118: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper=\"ftp\"                 " "helpers_custom.at:118"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-helper="ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/helpers_custom.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"21/tcp\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port=\"21/tcp\"                 " "helpers_custom.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      -q                       --service=ftptest --add-port="21/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_31
#AT_START_32
at_fn_group_banner 32 'policy.at:5' \
  "policy - xml" "                                   " 2
at_xfail=no
(
  $as_echo "32. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/policy.at:8: mkdir -p ./policies"
at_fn_check_prepare_trace "policy.at:8"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./policies/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-123">
<short>foobar</short>
<description>foobar policy</description>
<ingress-zone name="public" />
<egress-zone name="ANY" />
<service name="ssh" />
<service name="https" />
<port port="1234" protocol="tcp" />
<icmp-block name="echo-request" />
<masquerade />
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
<source-port port="1234" protocol="udp" />
<protocol value="ipv6-icmp" />
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <destination address="192.168.10.0/24" />
    <service name="ssh" />
    <accept>
        <limit value="5/m" />
    </accept>
</rule>
<rule>
    <port port="1234" protocol="tcp" />
    <reject />
</rule>
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <icmp-block name="echo-request" />
</rule>
<rule>
    <icmp-type name="echo-reply" />
    <drop />
</rule>
<rule family="ipv4">
    <forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
</rule>
<rule>
    <source-port port="1234" protocol="udp" />
    <log prefix="LOG: " level="warning" />
</rule>
<rule family="ipv6">
    <protocol value="ipv6-icmp" />
    <audit />
    <accept />
</rule>
<rule family="ipv4">
    <destination address="192.168.10.0/24" />
    <mark set="123" />
</rule>
</policy>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "policy.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }


































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_32
#AT_START_33
at_fn_group_banner 33 'policy.at:73' \
  "policy - create" "                                " 2
at_xfail=no
(
  $as_echo "33. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:73: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:73: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:73"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:77: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 " "policy.at:77"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:78: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy hostToWorld                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy hostToWorld                 " "policy.at:78"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy hostToWorld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:79: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy zoneToZone                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy zoneToZone                 " "policy.at:79"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy zoneToZone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:80: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 " "policy.at:80"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }














































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_33
#AT_START_34
at_fn_group_banner 34 'policy.at:90' \
  "policy - name" "                                  " 2
at_xfail=no
(
  $as_echo "34. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:90: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:90: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:90"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 123456789012345678                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 123456789012345678                 " "policy.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 123456789012345678
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 1234567890123456789                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 1234567890123456789                 " "policy.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy 1234567890123456789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/policy.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy public                 " "policy.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:99: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone allow-host-ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone allow-host-ipv6                 " "policy.at:99"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_34
#AT_START_35
at_fn_group_banner 35 'policy.at:103' \
  "policy - list" "                                  " 2
at_xfail=no
(
  $as_echo "35. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:103: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:103: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:103"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:164: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:164"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:203: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }                 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:203"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_35
#AT_START_36
at_fn_group_banner 36 'policy.at:225' \
  "policy - options" "                               " 2
at_xfail=no
(
  $as_echo "36. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:225: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:225: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:225"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:230: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --zone public                 " "policy.at:230"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:234: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-interface foobar0                 " "policy.at:234"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:236: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-interface foobar0                 " "policy.at:236"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:238: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-interface foobar0                 " "policy.at:238"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:240: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-interfaces                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-interfaces                 " "policy.at:240"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-source 10.10.10.0/24                 " "policy.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:246: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-source 10.10.10.0/24                 " "policy.at:246"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:248: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-source 10.10.10.0/24                 " "policy.at:248"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:250: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-sources                 " "policy.at:250"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:254: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-forward                 " "policy.at:254"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-forward                 " "policy.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:258: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-forward                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-forward                 " "policy.at:258"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }




































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:265: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-egress-zone public                 " "policy.at:265"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:266: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-egress-zone public                 " "policy.at:266"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:267: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-egress-zone public                 " "policy.at:267"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:268: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-egress-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-egress-zones                 " "policy.at:268"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }



































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-ingress-zone public                 " "policy.at:273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:274: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-ingress-zone public                 " "policy.at:274"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-ingress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-ingress-zone public                 " "policy.at:275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:276: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-ingress-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-ingress-zones                 " "policy.at:276"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:279: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-priority                 " "policy.at:279"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:280: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority 5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority 5                 " "policy.at:280"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --set-priority 5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_36
#AT_START_37
at_fn_group_banner 37 'policy.at:284' \
  "policy - priority" "                              " 2
at_xfail=no
(
  $as_echo "37. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:284: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:284: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:284"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:288: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost                 " "policy.at:288"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:289: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-ingress-zone ANY                 " "policy.at:289"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:290: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-egress-zone HOST                 " "policy.at:290"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:291: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -1                 " "policy.at:291"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --get-priority                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --get-priority                 " "policy.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:324: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 1                 " "policy.at:324"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:354: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy first                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy first                 " "policy.at:354"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy first
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:355: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-ingress-zone ANY                 " "policy.at:355"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:356: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-egress-zone HOST                 " "policy.at:356"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:357: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy second                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy second                 " "policy.at:357"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy second
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:358: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-ingress-zone ANY                 " "policy.at:358"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:359: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-egress-zone HOST                 " "policy.at:359"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:360: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy third                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy third                 " "policy.at:360"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy third
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:361: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-ingress-zone ANY                 " "policy.at:361"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-egress-zone HOST                 " "policy.at:362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fourth                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fourth                 " "policy.at:363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fourth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-ingress-zone ANY                 " "policy.at:364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-egress-zone HOST                 " "policy.at:365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fifth                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fifth                 " "policy.at:366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy fifth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-ingress-zone ANY                 " "policy.at:367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-egress-zone HOST                 " "policy.at:368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:370: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --set-priority -100                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --set-priority -100                 " "policy.at:370"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fourth --set-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:371: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --set-priority -5000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --set-priority -5000                 " "policy.at:371"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy second --set-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:372: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --set-priority -10000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --set-priority -10000                 " "policy.at:372"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy first --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --set-priority -1000                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --set-priority -1000                 " "policy.at:373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy third --set-priority -1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:374: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --set-priority -10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --set-priority -10                 " "policy.at:374"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy fifth --set-priority -10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:406: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 0                 " "policy.at:406"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:407: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32769                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32769                 " "policy.at:407"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:408: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32768                 " "policy.at:408"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:409: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32768                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32768                 " "policy.at:409"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:410: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32767                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32767                 " "policy.at:410"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy worldToHost --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_37
#AT_START_38
at_fn_group_banner 38 'policy.at:414' \
  "policy - zones" "                                 " 2
at_xfail=no
(
  $as_echo "38. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:414: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:414: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:414"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:417: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 " "policy.at:417"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:418: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 " "policy.at:418"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:420: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:420"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:421: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 " "policy.at:421"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:425: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:425"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:426: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 " "policy.at:426"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:427: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:427"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:428: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:428"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:429: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 " "policy.at:429"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:430: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:430"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:430"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:431: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 " "policy.at:431"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:432: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:432"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:433: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:433"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:434: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 " "policy.at:434"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:435: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:435"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:436: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"public\"                 " "policy.at:436"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:437: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"internal\"                 " "policy.at:437"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:438: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"internal\"                 " "policy.at:438"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:439: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:439"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:440: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:440"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:441: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"ANY\"                 " "policy.at:441"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:442: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone=\"HOST\"                 " "policy.at:442"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:443: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 " "policy.at:443"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:444: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"internal\"                 " "policy.at:444"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:467: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:467"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:468: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:468"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:469: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:469"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:470: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"HOST\"                 " "policy.at:470"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:471: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:471"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:472: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:472"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:472"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:473: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:473"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:474: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 " "policy.at:474"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:475: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:475"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:475"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:476: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 " "policy.at:476"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:477: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:477"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:478: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:478"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:479: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 " "policy.at:479"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:480: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"internal\"                 " "policy.at:480"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:497: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"ANY\"                 " "policy.at:497"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:498: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"ANY\"                 " "policy.at:498"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:499: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 " "policy.at:499"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:500: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"ANY\"                 " "policy.at:500"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:501: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"ANY\"                 " "policy.at:501"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:502: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"ANY\"                 " "policy.at:502"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:511: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:511"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:512: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"public\"                 " "policy.at:512"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:513: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 " "policy.at:513"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:514: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone=\"public\"                 " "policy.at:514"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:515: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 " "policy.at:515"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:516: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone=\"public\"                 " "policy.at:516"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:525: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"HOST\"                 " "policy.at:525"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:526: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"HOST\"                 " "policy.at:526"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:527: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"HOST\"                 " "policy.at:527"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }
























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:533: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"does_not_exist\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"does_not_exist\"                 " "policy.at:533"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:534: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"does_not_exist\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"does_not_exist\"                 " "policy.at:534"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:534"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:541: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone=\"public\"                 " "policy.at:541"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }


































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:558: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone=\"internal\"                 " "policy.at:558"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }


































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:581: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone=\"public\"                 " "policy.at:581"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_38
#AT_START_39
at_fn_group_banner 39 'policy.at:601' \
  "policy - dispatch" "                              " 2
at_xfail=no
(
  $as_echo "39. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:601: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:601: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:601"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:604: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0                 " "policy.at:604"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:605: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1                 " "policy.at:605"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:607: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:607"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:607"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:608: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1                 " "policy.at:608"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:608"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_39
#AT_START_40
at_fn_group_banner 40 'policy.at:1911' \
  "policy - interfaces/sources" "                    " 2
at_xfail=no
(
  $as_echo "40. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:1911: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:1911: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:1911"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:1914: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:1914"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:1915: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 " "policy.at:1915"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1915"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:1916: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 " "policy.at:1916"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1916"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:1917: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone public                 " "policy.at:1917"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1917"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_40
#AT_START_41
at_fn_group_banner 41 'policy.at:2078' \
  "policy - target" "                                " 2
at_xfail=no
(
  $as_echo "41. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:2078: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:2078: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:2078"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2081: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "policy.at:2081"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2081"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2083: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=CONTINUE                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=CONTINUE                 " "policy.at:2083"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2083"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2084: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 " "policy.at:2084"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2084"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2085: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DROP                 " "policy.at:2085"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2085"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2086: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=REJECT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=REJECT                 " "policy.at:2086"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=REJECT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2086"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2087: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DENY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DENY                 " "policy.at:2087"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:2087"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2088: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=default                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=default                 " "policy.at:2088"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:2088"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2091: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT                 " "policy.at:2091"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2091"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2092: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal                 " "policy.at:2092"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2092"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2093: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                  "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                  " "policy.at:2093"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2094: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone HOST                 " "policy.at:2094"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2094"
$at_failed && at_fn_log_failure
$at_traceon; }











































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_41
#AT_START_42
at_fn_group_banner 42 'policy.at:2127' \
  "policy - from file" "                             " 2
at_xfail=no
(
  $as_echo "42. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:2127: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:2127: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:2127"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2130: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-protocol ipv6-icmp                 " "policy.at:2130"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy allow-host-ipv6 --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2130"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/policy.at:2131: ls \"./policies/allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:2131"
( $at_check_trace; ls "./policies/allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2131"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2132: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6                 " "policy.at:2132"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy-from-file "./policies/allow-host-ipv6.xml" --name my-allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2132"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/policy.at:2133: ls \"./policies/my-allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:2133"
( $at_check_trace; ls "./policies/my-allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2133"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/policy.at:2134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies                 " "policy.at:2134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2134"
$at_failed && at_fn_log_failure
$at_traceon; }














































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_42
#AT_START_43
at_fn_group_banner 43 'services.at:1' \
  "services" "                                       " 2
at_xfail=no
(
  $as_echo "43. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "services.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "services.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "services.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service ssh                 " "services.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 " "services.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-service-from-policy ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-service-from-policy ssh                 " "services.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-service-from-policy ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:38: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh                 " "services.at:38"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept'                 " "services.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service does-not-exist                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service does-not-exist                 " "services.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/services.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-interface raboof0 --add-service ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-interface raboof0 --add-service ssh                 " "services.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }




















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_43
#AT_START_44
at_fn_group_banner 44 'ports.at:1' \
  "ports" "                                          " 2
at_xfail=no
(
  $as_echo "44. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "ports.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "ports.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "ports.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/tcp                 " "ports.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/udp                 " "ports.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 4321/udp                 " "ports.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'                 " "ports.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 " "ports.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 " "ports.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 4321/udp                 " "ports.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'                 " "ports.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/tcp                 " "ports.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp                 " "ports.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp                 " "ports.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/udp                 " "ports.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 4321/udp                 " "ports.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'                 " "ports.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234                 " "ports.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 123443/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 123443/tcp                 " "ports.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/bogus                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/bogus                 " "ports.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 accept'                 " "ports.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:102: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'                 " "ports.at:102"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/ports.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'                 " "ports.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_44
#AT_START_45
at_fn_group_banner 45 'source_ports.at:1' \
  "source ports" "                                   " 2
at_xfail=no
(
  $as_echo "45. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "source_ports.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "source_ports.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "source_ports.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/tcp                 " "source_ports.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/udp                 " "source_ports.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 4321/udp                 " "source_ports.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'                 " "source_ports.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 " "source_ports.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 " "source_ports.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 4321/udp                 " "source_ports.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'                 " "source_ports.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/tcp                 " "source_ports.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp                 " "source_ports.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp                 " "source_ports.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/udp                 " "source_ports.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 4321/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 4321/udp                 " "source_ports.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'                 " "source_ports.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234                 " "source_ports.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 123443/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 123443/tcp                 " "source_ports.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/bogus                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/bogus                 " "source_ports.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 accept'                 " "source_ports.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:102: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'                 " "source_ports.at:102"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/source_ports.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'                 " "source_ports.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_45
#AT_START_46
at_fn_group_banner 46 'forward_ports.at:1' \
  "forward ports" "                                  " 2
at_xfail=no
(
  $as_echo "46. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "forward_ports.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "forward_ports.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 " "forward_ports.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 " "forward_ports.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 " "forward_ports.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:18: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:18"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:42: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10                 " "forward_ports.at:42"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321                 " "forward_ports.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }










































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:88: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port 1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port 1234                 " "forward_ports.at:88"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp                 " "forward_ports.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111                 " "forward_ports.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10                 " "forward_ports.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'                 " "forward_ports.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:99: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'                 " "forward_ports.at:99"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'                 " "forward_ports.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'                 " "forward_ports.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:106: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 " "forward_ports.at:106"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "forward_ports.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:111: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:111"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:114: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:114"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }
























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:136: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 " "forward_ports.at:136"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }
























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:142: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 " "forward_ports.at:142"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:143: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:143"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:144: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:144"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }
























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:149: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:149"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:150: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 " "forward_ports.at:150"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:155: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0                 " "forward_ports.at:155"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:156: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone internal                 " "forward_ports.at:156"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:157: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:157"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:158: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:158"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:159: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:159"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:160: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:160"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:168: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --remove-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --remove-interface foobar0                 " "forward_ports.at:168"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:173: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.10.10.0/24                 " "forward_ports.at:173"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:174: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222                 " "forward_ports.at:174"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:175: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1                 " "forward_ports.at:175"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:176: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'                 " "forward_ports.at:176"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/forward_ports.at:177: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'                 " "forward_ports.at:177"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }










































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_46
#AT_START_47
at_fn_group_banner 47 'masquerade.at:1' \
  "masquerade" "                                     " 2
at_xfail=no
(
  $as_echo "47. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 " "masquerade.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "masquerade.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "masquerade.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 " "masquerade.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-masquerade                 " "masquerade.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 " "masquerade.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }














































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-masquerade                 " "masquerade.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade                 " "masquerade.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_host                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_host                 " "masquerade.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_host
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:72: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-ingress-zone internal                 " "masquerade.at:72"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:73: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-egress-zone HOST                 " "masquerade.at:73"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:75: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-masquerade                 " "masquerade.at:75"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:76: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:76"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:79: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-ingress-zone internal                 " "masquerade.at:79"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:80: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-egress-zone HOST                 " "masquerade.at:80"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_host --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:84: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_int_to_pub                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_int_to_pub                 " "masquerade.at:84"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar_int_to_pub
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:85: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1                 " "masquerade.at:85"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:86: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-ingress-zone internal                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-ingress-zone internal                 " "masquerade.at:86"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:87: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-egress-zone public                 " "masquerade.at:87"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:89: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 " "masquerade.at:89"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:90: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:90"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1                 " "masquerade.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24                 " "masquerade.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:99: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade                 " "masquerade.at:99"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'                 " "masquerade.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/masquerade.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24                 " "masquerade.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_47
#AT_START_48
at_fn_group_banner 48 'protocols.at:1' \
  "protocols" "                                      " 2
at_xfail=no
(
  $as_echo "48. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "protocols.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "protocols.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "protocols.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol ipv6-icmp                 " "protocols.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dccp                 " "protocols.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol gre                 " "protocols.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept'                 " "protocols.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 " "protocols.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 " "protocols.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol gre                 " "protocols.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept'                 " "protocols.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol ipv6-icmp                 " "protocols.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp                 " "protocols.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp                 " "protocols.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol dccp                 " "protocols.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol gre                 " "protocols.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept'                 " "protocols.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dummy                 " "protocols.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/protocols.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept'                 " "protocols.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }




















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_48
#AT_START_49
at_fn_group_banner 49 'rich_rules.at:1' \
  "rich rules" "                                     " 2
at_xfail=no
(
  $as_echo "49. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "rich_rules.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "rich_rules.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "rich_rules.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }
























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:42: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'                 " "rich_rules.at:42"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'                 " "rich_rules.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'                 " "rich_rules.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'                 " "rich_rules.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:46: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'                 " "rich_rules.at:46"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'                 " "rich_rules.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:48: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'                 " "rich_rules.at:48"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }












































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'                 " "rich_rules.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:111: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'                 " "rich_rules.at:111"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'                 " "rich_rules.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'                 " "rich_rules.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:138: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept'                 " "rich_rules.at:138"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:139: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept'                 " "rich_rules.at:139"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:168: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 " "rich_rules.at:168"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:173: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "rich_rules.at:173"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:174: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 " "rich_rules.at:174"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:175: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 " "rich_rules.at:175"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }






















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:193: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST                 " "rich_rules.at:193"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:198: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY                 " "rich_rules.at:198"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }






















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:216: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY                 " "rich_rules.at:216"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:221: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source 10.10.10.0/24                 " "rich_rules.at:221"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:222: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 " "rich_rules.at:222"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }






















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:240: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 " "rich_rules.at:240"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:241: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-source 10.10.10.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-source 10.10.10.0/24                 " "rich_rules.at:241"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'                 " "rich_rules.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:246: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'                 " "rich_rules.at:246"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:252: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0                 " "rich_rules.at:252"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:253: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public                 " "rich_rules.at:253"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:254: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'                 " "rich_rules.at:254"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:255: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface foobar0                 " "rich_rules.at:255"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public                 " "rich_rules.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:263: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "rich_rules.at:263"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:267: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"'                 " "rich_rules.at:267"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_rules.at:268: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'                 " "rich_rules.at:268"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }











































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_49
#AT_START_50
at_fn_group_banner 50 'icmp_blocks.at:1' \
  "ICMP blocks" "                                    " 2
at_xfail=no
(
  $as_echo "50. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar                 " "icmp_blocks.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY                 " "icmp_blocks.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST                 " "icmp_blocks.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-request                 " "icmp_blocks.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-reply                 " "icmp_blocks.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block redirect                 " "icmp_blocks.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:15: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 " "icmp_blocks.at:15"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:16: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 " "icmp_blocks.at:16"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:17: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block redirect                 " "icmp_blocks.at:17"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:18: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:18"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-request                 " "icmp_blocks.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request                 " "icmp_blocks.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply                 " "icmp_blocks.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-reply                 " "icmp_blocks.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block redirect                 " "icmp_blocks.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"'                 " "icmp_blocks.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block dummy                 " "icmp_blocks.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }

































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"'                 " "icmp_blocks.at:143"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }






















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_50
#AT_START_51
at_fn_group_banner 51 'rich_tcp_mss_clamp.at:5' \
  "tcp-mss-clamp" "                                  " 2
at_xfail=no
(
  $as_echo "51. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:8: mkdir -p ./zones"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:8"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="536"/>
  </rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:20: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:20"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="pmtu"/>
  </rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="thisdoesnotexist"/>
  </rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:44"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "rich_tcp_mss_clamp.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }






{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:65: rm ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:65"
( $at_check_trace; rm ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'                 " "rich_tcp_mss_clamp.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp'                 " "rich_tcp_mss_clamp.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule tcp-mss-clamp'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule tcp-mss-clamp'                 " "rich_tcp_mss_clamp.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:69: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=0'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=0'                 " "rich_tcp_mss_clamp.at:69"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:70: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=536'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=536'                 " "rich_tcp_mss_clamp.at:70"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=pmtu'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=pmtu'                 " "rich_tcp_mss_clamp.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





















































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_51
#AT_START_52
at_fn_group_banner 52 'rich_destination_ipset.at:1' \
  "rich destination ipset" "                         " 2
at_xfail=no
(
  $as_echo "52. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=mypolicy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=mypolicy                 " "rich_destination_ipset.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-policy=mypolicy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:5: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-ingress-zone ANY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-ingress-zone ANY                 " "rich_destination_ipset.at:5"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-egress-zone HOST                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-egress-zone HOST                 " "rich_destination_ipset.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy=mypolicy --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 " "rich_destination_ipset.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:12: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 " "rich_destination_ipset.at:12"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:29: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'                 " "rich_destination_ipset.at:29"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }






































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:43: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 " "rich_destination_ipset.at:43"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:45: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 " "rich_destination_ipset.at:45"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'                 " "rich_destination_ipset.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'                 " "rich_destination_ipset.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }




















      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_52
#AT_START_53
at_fn_group_banner 53 'zone.at:1' \
  "zone - target" "                                  " 2
at_xfail=no
(
  $as_echo "53. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:4: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 " "zone.at:4"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:6: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 " "zone.at:6"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "zone.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:8: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 " "zone.at:8"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:9: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 " "zone.at:9"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:10: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=CONTINUE                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=CONTINUE                 " "zone.at:10"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:11: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DENY                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DENY                 " "zone.at:11"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:13: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "zone.at:13"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:14: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-interface foobar0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-interface foobar0                 " "zone.at:14"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/zone.at:89: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default                 " "zone.at:89"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }





















































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_53
#AT_START_54
at_fn_group_banner 54 'rpfilter.at:1' \
  "rpfilter" "                                       " 2
at_xfail=no
(
  $as_echo "54. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :





    else
        :





    fi








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_54
#AT_START_55
at_fn_group_banner 55 'firewall-offline-cmd.at:19' \
  "lokkit migration" "                               " 2
at_xfail=no
(
  $as_echo "55. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:19: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-offline-cmd.at:19"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:19: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-offline-cmd.at:19"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:23: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444" "firewall-offline-cmd.at:23"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:31: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:31"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:38: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:38"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:39: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:39"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:42: cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF
    "
at_fn_check_prepare_notrace 'an embedded newline' "firewall-offline-cmd.at:42"
( $at_check_trace; cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall" "firewall-offline-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:69: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:69"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:70: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:70"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:71: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:71"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_55
#AT_START_56
at_fn_group_banner 56 'firewalld.conf.at:1' \
  "firewalld.conf" "                                 " 3
at_xfail=no
(
  $as_echo "56. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

   EXPECTED_IPV6_RPFILTER_VALUE=yes

    else
        :

   EXPECTED_IPV6_RPFILTER_VALUE=no

    fi




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

    EXPECTED_INDIVIDUAL_CALLS_VALUE=no

        else
            :

    EXPECTED_INDIVIDUAL_CALLS_VALUE=yes

        fi


    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:\"org.fedoraproject.FirewallD1.config\"               | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer \" : \" $0} } /^dict entry/{line_mark=line}' | sort "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:"org.fedoraproject.FirewallD1.config"               | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer " : " $0} } /^dict entry/{line_mark=line}' | sort
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "string \"AllowZoneDrifting\" : variant string \"no\"
string \"AutomaticHelpers\" : variant string \"no\"
string \"CleanupModulesOnExit\" : variant string \"no\"
string \"CleanupOnExit\" : variant string \"yes\"
string \"DefaultZone\" : variant string \"public\"
string \"FirewallBackend\" : variant string \"nftables\"
string \"FlushAllOnReload\" : variant string \"yes\"
string \"IPv6_rpfilter\" : variant string \"${EXPECTED_IPV6_RPFILTER_VALUE}\"
string \"IndividualCalls\" : variant string \"${EXPECTED_INDIVIDUAL_CALLS_VALUE}\"
string \"Lockdown\" : variant string \"no\"
string \"LogDenied\" : variant string \"off\"
string \"MinimalMark\" : variant int32 100
string \"RFC3964_IPv4\" : variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\" int32:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark" int32:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant int32 100
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"Lockdown" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"Lockdown"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\" string:\"all\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"LogDenied" string:"all"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"LogDenied"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"all\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\" string:\"iptables\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend" string:"iptables"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"iptables\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\" string:\"no\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupModulesOnExit\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"CleanupModulesOnExit" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupModulesOnExit\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"CleanupModulesOnExit"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\" string:\"no\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\" string:\"no\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"AllowZoneDrifting\" string:\"yes\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"AllowZoneDrifting" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"AllowZoneDrifting\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"AllowZoneDrifting"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "firewalld.conf.at:56" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:56"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_56
#AT_START_57
at_fn_group_banner 57 'service.at:1' \
  "dbus api - services" "                            " 3
at_xfail=no
(
  $as_echo "57. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/service.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/service.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/service.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:1"






    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"
    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"

    { set +x
$as_echo "$at_srcdir/service.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:11" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:11"

    { set +x
$as_echo "$at_srcdir/service.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar\"      '(\"1.0\",        \"foobar\",        \"foobar service is for foobar\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {\"ipv4\": \"1.2.3.4\"},        [\"icmp\", \"igmp\"],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar"      '("1.0",        "foobar",        "foobar service is for foobar",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {"ipv4": "1.2.3.4"},        ["icmp", "igmp"],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"
    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"

    { set +x
$as_echo "$at_srcdir/service.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:31"

    { set +x
$as_echo "$at_srcdir/service.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.0', 'foobar', 'foobar service is for foobar', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], {'ipv4': '1.2.3.4'}, ['icmp', 'igmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"
    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"

    { set +x
$as_echo "$at_srcdir/service.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:40"

    { set +x
$as_echo "$at_srcdir/service.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '(\"1.1\",        \"foobar new\",        \"foobar new service is for foobar\",        [(\"12345\", \"udp\"), (\"2222\", \"tcp\")],        [\"ftp\"],        {},        [\"icmp\"],        [(\"4321\", \"tcp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '("1.1",        "foobar new",        "foobar new service is for foobar",        [("12345", "udp"), ("2222", "tcp")],        ["ftp"],        {},        ["icmp"],        [("4321", "tcp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:52"

    { set +x
$as_echo "$at_srcdir/service.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"
    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"

    { set +x
$as_echo "$at_srcdir/service.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"loadDefaults\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="loadDefaults"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:60" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:60"

    { set +x
$as_echo "$at_srcdir/service.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ_TEMP=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ_TEMP

    $as_echo "service.at:63" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:63"

    { set +x
$as_echo "$at_srcdir/service.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.setVersion \"1.1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.setVersion "1.1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:64" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:64"

    { set +x
$as_echo "$at_srcdir/service.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:65"

    { set +x
$as_echo "$at_srcdir/service.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName \"ssh\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getServiceByName "ssh"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ_TEMP=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ_TEMP

    $as_echo "service.at:68" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:68"

    { set +x
$as_echo "$at_srcdir/service.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ_TEMP}                            --method org.fedoraproject.FirewallD1.config.service.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:72"
    $as_echo "service.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:72"

    { set +x
$as_echo "$at_srcdir/service.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"remove\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="remove"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:76"
    $as_echo "service.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:76"

    { set +x
$as_echo "$at_srcdir/service.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"rename\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="rename"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:82"
    $as_echo "service.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:82"

    { set +x
$as_echo "$at_srcdir/service.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getVersion\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:87"
    $as_echo "service.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:87"

    { set +x
$as_echo "$at_srcdir/service.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setVersion\">
<arg direction=\"in\" name=\"version\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:93"
    $as_echo "service.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:93"

    { set +x
$as_echo "$at_srcdir/service.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getShort\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:98"
    $as_echo "service.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:98"

    { set +x
$as_echo "$at_srcdir/service.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setShort\">
<arg direction=\"in\" name=\"short\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:104" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:104"
    $as_echo "service.at:104" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:104"

    { set +x
$as_echo "$at_srcdir/service.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDescription\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:109"
    $as_echo "service.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:109"

    { set +x
$as_echo "$at_srcdir/service.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDescription\">
<arg direction=\"in\" name=\"description\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:115"
    $as_echo "service.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:115"

    { set +x
$as_echo "$at_srcdir/service.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:120"
    $as_echo "service.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:120"

    { set +x
$as_echo "$at_srcdir/service.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"
    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"

    { set +x
$as_echo "$at_srcdir/service.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:131" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:131"
    $as_echo "service.at:131" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:131"

    { set +x
$as_echo "$at_srcdir/service.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:137"
    $as_echo "service.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:137"

    { set +x
$as_echo "$at_srcdir/service.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:145"
    $as_echo "service.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:145"

    { set +x
$as_echo "$at_srcdir/service.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:150"
    $as_echo "service.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:150"

    { set +x
$as_echo "$at_srcdir/service.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSourcePorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"
    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"

    { set +x
$as_echo "$at_srcdir/service.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:161" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:161"
    $as_echo "service.at:161" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:161"

    { set +x
$as_echo "$at_srcdir/service.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:167"
    $as_echo "service.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:167"

    { set +x
$as_echo "$at_srcdir/service.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"querySourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="querySourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:175" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:175"
    $as_echo "service.at:175" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:175"

    { set +x
$as_echo "$at_srcdir/service.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:180"
    $as_echo "service.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:180"

    { set +x
$as_echo "$at_srcdir/service.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setProtocols\">
<arg direction=\"in\" name=\"protocols\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:185"
    $as_echo "service.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:185"

    { set +x
$as_echo "$at_srcdir/service.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"
    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"

    { set +x
$as_echo "$at_srcdir/service.at:190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:190"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"
    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"

    { set +x
$as_echo "$at_srcdir/service.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:202"
    $as_echo "service.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:202"

    { set +x
$as_echo "$at_srcdir/service.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getModules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getModules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getModules\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:207" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:207"
    $as_echo "service.at:207" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:207"

    { set +x
$as_echo "$at_srcdir/service.at:207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setModules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setModules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setModules\">
<arg direction=\"in\" name=\"modules\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:207"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:212"
    $as_echo "service.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:212"

    { set +x
$as_echo "$at_srcdir/service.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addModule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addModule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"
    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"

    { set +x
$as_echo "$at_srcdir/service.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeModule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeModule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"
    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"

    { set +x
$as_echo "$at_srcdir/service.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryModule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryModule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:229"
    $as_echo "service.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:229"

    { set +x
$as_echo "$at_srcdir/service.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestinations\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestinations"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestinations\">
<arg direction=\"out\" type=\"a{ss}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:234"
    $as_echo "service.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:234"

    { set +x
$as_echo "$at_srcdir/service.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestinations\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestinations"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestinations\">
<arg direction=\"in\" name=\"destinations\" type=\"a{ss}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"
    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"

    { set +x
$as_echo "$at_srcdir/service.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
<arg direction=\"in\" name=\"address\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:245"
    $as_echo "service.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:245"

    { set +x
$as_echo "$at_srcdir/service.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:251"
    $as_echo "service.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:251"

    { set +x
$as_echo "$at_srcdir/service.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:256"
    $as_echo "service.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:256"

    { set +x
$as_echo "$at_srcdir/service.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryDestination\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryDestination"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"></arg>
<arg direction=\"in\" name=\"address\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:264" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:264"
    $as_echo "service.at:264" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:264"

    { set +x
$as_echo "$at_srcdir/service.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getIncludes\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getIncludes"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIncludes\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:269"

    { set +x
$as_echo "$at_srcdir/service.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(@as [],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"
    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"

    { set +x
$as_echo "$at_srcdir/service.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setIncludes\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setIncludes"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIncludes\">
<arg direction=\"in\" name=\"includes\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:277"

    { set +x
$as_echo "$at_srcdir/service.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '[\"https\", \"ssh\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.setIncludes '["https", "ssh"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:278" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:278"

    { set +x
$as_echo "$at_srcdir/service.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getIncludes ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https', 'ssh'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:281" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:281"
    $as_echo "service.at:281" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:281"

    { set +x
$as_echo "$at_srcdir/service.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addInclude\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addInclude"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:286"

    { set +x
$as_echo "$at_srcdir/service.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.addInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:287" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:287"

    { set +x
$as_echo "$at_srcdir/service.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:290"
    $as_echo "service.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:290"

    { set +x
$as_echo "$at_srcdir/service.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeInclude\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeInclude"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:295" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:295"

    { set +x
$as_echo "$at_srcdir/service.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.removeInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:296"
    $as_echo "service.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:296"

    { set +x
$as_echo "$at_srcdir/service.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryInclude\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryInclude"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:302" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:302"

    { set +x
$as_echo "$at_srcdir/service.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '\"http\"'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.queryInclude '"http"'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:307"
    $as_echo "service.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:307"

    { set +x
$as_echo "$at_srcdir/service.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:313" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:313"

    { set +x
$as_echo "$at_srcdir/service.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "service.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:324"

    { set +x
$as_echo "$at_srcdir/service.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar-old\"      '(\"1.0\",        \"foobar-old\",        \"foobar-old service is for foobar-old\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {},        [],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar-old"      '("1.0",        "foobar-old",        "foobar-old service is for foobar-old",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {},        [],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ

    $as_echo "service.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:338"

    { set +x
$as_echo "$at_srcdir/service.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\"]>,
       \"protocols\": <[\"icmp\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https"]>,
       "protocols": <["icmp"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:345" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:345"

    { set +x
$as_echo "$at_srcdir/service.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:348"

    { set +x
$as_echo "$at_srcdir/service.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:360"

    { set +x
$as_echo "$at_srcdir/service.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:363" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:363"

    { set +x
$as_echo "$at_srcdir/service.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:375"
    $as_echo "service.at:375" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:375"

    { set +x
$as_echo "$at_srcdir/service.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService2\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:382" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:382"

    { set +x
$as_echo "$at_srcdir/service.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 \"foobar-dict\"      '{\"version\": <\"1.0\">,
       \"short\": <\"foobar-dict\">,
       \"description\": <\"foobar-dict service is for foobar-dict\">,
       \"ports\": <[(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")]>,
       \"modules\": <[\"ftp\"]>,
       \"destination\": <{\"ipv6\": \"1234::4321\"}>,
       \"protocols\": <[\"icmp\", \"igmp\"]>,
       \"source_ports\": <[(\"4321\", \"tcp\"), (\"4321\", \"udp\")]>,
       \"includes\": <[\"https\", \"samba\"]>,
       \"helpers\": <[\"ftp\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 "foobar-dict"      '{"version": <"1.0">,
       "short": <"foobar-dict">,
       "description": <"foobar-dict service is for foobar-dict">,
       "ports": <[("1234", "udp"), ("22", "tcp"), ("1234", "udp")]>,
       "modules": <["ftp"]>,
       "destination": <{"ipv6": "1234::4321"}>,
       "protocols": <["icmp", "igmp"]>,
       "source_ports": <[("4321", "tcp"), ("4321", "udp")]>,
       "includes": <["https", "samba"]>,
       "helpers": <["ftp"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:399" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:399"
    $as_echo "service.at:399" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:399"

    { set +x
$as_echo "$at_srcdir/service.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings2\">
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:404" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:404"

    { set +x
$as_echo "$at_srcdir/service.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'includes': <['https', 'samba']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:418" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:418"
    $as_echo "service.at:418" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:418"

    { set +x
$as_echo "$at_srcdir/service.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update2\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:423" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:423"

    { set +x
$as_echo "$at_srcdir/service.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\", \"samba\", \"http\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https", "samba", "http"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:428" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:428"

    { set +x
$as_echo "$at_srcdir/service.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'includes': <['https', 'samba', 'http']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:442" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:442"

    { set +x
$as_echo "$at_srcdir/service.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.2\">,
       \"includes\": <@as []>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.2">,
       "includes": <@as []>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:447" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:447"

    { set +x
$as_echo "$at_srcdir/service.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:460"
    $as_echo "service.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:460"

    { set +x
$as_echo "$at_srcdir/service.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings2\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:466" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:466"

    { set +x
$as_echo "$at_srcdir/service.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-dict\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-dict"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'helpers': <['ftp']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:479" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:479"

    { set +x
$as_echo "$at_srcdir/service.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.3\">,
       \"thisdoesnotexist\": <\"\">
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.3">,
       "thisdoesnotexist": <"">
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_OPTION: option/d'" != x"ignore"; then
            $as_echo "service.at:485" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_OPTION: option/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service.at:485"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_57
#AT_START_58
at_fn_group_banner 58 'zone_permanent_signatures.at:1' \
  "dbus api - zone permanent signatures" "           " 3
at_xfail=no
(
  $as_echo "58. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_permanent_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_permanent_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:1"







    $as_echo "zone_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:8"
    $as_echo "zone_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:8"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"listZones\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="listZones"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"listZones\">
<arg direction=\"out\" type=\"ao\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:13"
    $as_echo "zone_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:13"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneNames\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneNames"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneNames\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:18"
    $as_echo "zone_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:18"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneByName\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneByName"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneByName\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:24"
    $as_echo "zone_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:24"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"addZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addZone\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:33"
    $as_echo "zone_permanent_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:33"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneOfInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneOfInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfInterface\">
<arg direction=\"in\" name=\"iface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:39" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:39"
    $as_echo "zone_permanent_signatures.at:39" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:39"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getZoneOfSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getZoneOfSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "zone_permanent_signatures.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:52"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_PUBLIC_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_PUBLIC_ZONE_OBJ


    $as_echo "zone_permanent_signatures.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:56"
    $as_echo "zone_permanent_signatures.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:56"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:62" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:62"
    $as_echo "zone_permanent_signatures.at:62" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:62"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:67"
    $as_echo "zone_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:67"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//signal[@name=\"Updated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Updated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Updated\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:73" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:73"
    $as_echo "zone_permanent_signatures.at:73" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:73"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"loadDefaults\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="loadDefaults"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:78"
    $as_echo "zone_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:78"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"remove\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="remove"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:82"
    $as_echo "zone_permanent_signatures.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:82"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//signal[@name=\"Removed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Removed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Removed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:88" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:88"
    $as_echo "zone_permanent_signatures.at:88" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:88"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"rename\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="rename"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:93"
    $as_echo "zone_permanent_signatures.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:93"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//signal[@name=\"Renamed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//signal[@name="Renamed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Renamed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:101" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:101"
    $as_echo "zone_permanent_signatures.at:101" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:101"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getVersion\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:106" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:106"
    $as_echo "zone_permanent_signatures.at:106" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:106"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setVersion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setVersion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setVersion\">
<arg direction=\"in\" name=\"version\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:114" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:114"
    $as_echo "zone_permanent_signatures.at:114" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:114"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getShort\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:119" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:119"
    $as_echo "zone_permanent_signatures.at:119" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:119"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setShort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setShort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setShort\">
<arg direction=\"in\" name=\"short\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:127" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:127"
    $as_echo "zone_permanent_signatures.at:127" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:127"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDescription\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:132" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:132"
    $as_echo "zone_permanent_signatures.at:132" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:132"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setDescription\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setDescription"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDescription\">
<arg direction=\"in\" name=\"description\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:140"
    $as_echo "zone_permanent_signatures.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:140"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getTarget\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getTarget"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getTarget\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:145"
    $as_echo "zone_permanent_signatures.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:145"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setTarget\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setTarget"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setTarget\">
<arg direction=\"in\" name=\"target\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:153"
    $as_echo "zone_permanent_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:153"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getInterfaces\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getInterfaces"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getInterfaces\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:158"
    $as_echo "zone_permanent_signatures.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:158"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setInterfaces\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setInterfaces"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setInterfaces\">
<arg direction=\"in\" name=\"interfaces\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:163"
    $as_echo "zone_permanent_signatures.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:163"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:168"
    $as_echo "zone_permanent_signatures.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:168"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:173" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:173"
    $as_echo "zone_permanent_signatures.at:173" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:173"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:182"
    $as_echo "zone_permanent_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:182"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSources\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSources"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSources\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:187" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:187"
    $as_echo "zone_permanent_signatures.at:187" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:187"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:187:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setSources\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:187"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setSources"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSources\">
<arg direction=\"in\" name=\"sources\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:187"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:192" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:192"
    $as_echo "zone_permanent_signatures.at:192" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:192"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:192:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:192"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:192"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:197" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:197"
    $as_echo "zone_permanent_signatures.at:197" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:197"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:197"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:202"
    $as_echo "zone_permanent_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:202"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"querySource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="querySource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:211" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:211"
    $as_echo "zone_permanent_signatures.at:211" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:211"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getServices\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getServices"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServices\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:216" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:216"
    $as_echo "zone_permanent_signatures.at:216" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:216"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setServices\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setServices"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setServices\">
<arg direction=\"in\" name=\"services\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:221" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:221"
    $as_echo "zone_permanent_signatures.at:221" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:221"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:226"
    $as_echo "zone_permanent_signatures.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:226"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:231" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:231"
    $as_echo "zone_permanent_signatures.at:231" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:231"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryService\">
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:240"
    $as_echo "zone_permanent_signatures.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:240"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:245"
    $as_echo "zone_permanent_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:245"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:250"
    $as_echo "zone_permanent_signatures.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:250"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:256"
    $as_echo "zone_permanent_signatures.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:256"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:262"
    $as_echo "zone_permanent_signatures.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:262"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:272"
    $as_echo "zone_permanent_signatures.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:272"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"out\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:277"
    $as_echo "zone_permanent_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:277"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSourcePorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:282" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:282"
    $as_echo "zone_permanent_signatures.at:282" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:282"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:288" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:288"
    $as_echo "zone_permanent_signatures.at:288" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:288"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:294" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:294"
    $as_echo "zone_permanent_signatures.at:294" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:294"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"querySourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="querySourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:304" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:304"
    $as_echo "zone_permanent_signatures.at:304" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:304"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:309" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:309"
    $as_echo "zone_permanent_signatures.at:309" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:309"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setProtocols\">
<arg direction=\"in\" name=\"protocols\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:314" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:314"
    $as_echo "zone_permanent_signatures.at:314" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:314"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:319"
    $as_echo "zone_permanent_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:319"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:324"
    $as_echo "zone_permanent_signatures.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:324"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:333"
    $as_echo "zone_permanent_signatures.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:333"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getForwardPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getForwardPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getForwardPorts\">
<arg direction=\"out\" type=\"a(ssss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:338"
    $as_echo "zone_permanent_signatures.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:338"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setForwardPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setForwardPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setForwardPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ssss)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:343" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:343"
    $as_echo "zone_permanent_signatures.at:343" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:343"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addForwardPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:351"
    $as_echo "zone_permanent_signatures.at:351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:351"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeForwardPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:351"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:359" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:359"
    $as_echo "zone_permanent_signatures.at:359" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:359"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryForwardPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:371"
    $as_echo "zone_permanent_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:371"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getMasquerade\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:376"
    $as_echo "zone_permanent_signatures.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:376"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setMasquerade\">
<arg direction=\"in\" name=\"masquerade\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:381"
    $as_echo "zone_permanent_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:381"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addMasquerade\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:385"
    $as_echo "zone_permanent_signatures.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:385"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeMasquerade\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:389"
    $as_echo "zone_permanent_signatures.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:389"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryMasquerade\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:397" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:397"
    $as_echo "zone_permanent_signatures.at:397" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:397"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getIcmpBlocks\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getIcmpBlocks"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIcmpBlocks\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:402" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:402"
    $as_echo "zone_permanent_signatures.at:402" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:402"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setIcmpBlocks\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setIcmpBlocks"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIcmpBlocks\">
<arg direction=\"in\" name=\"icmptypes\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:407" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:407"
    $as_echo "zone_permanent_signatures.at:407" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:407"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlock\">
<arg direction=\"in\" name=\"icmptype\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:412" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:412"
    $as_echo "zone_permanent_signatures.at:412" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:412"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlock\">
<arg direction=\"in\" name=\"icmptype\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:417" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:417"
    $as_echo "zone_permanent_signatures.at:417" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:417"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlock\">
<arg direction=\"in\" name=\"icmptype\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:426" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:426"
    $as_echo "zone_permanent_signatures.at:426" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:426"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIcmpBlockInversion\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:431" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:431"
    $as_echo "zone_permanent_signatures.at:431" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:431"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIcmpBlockInversion\">
<arg direction=\"in\" name=\"flag\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:436" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:436"
    $as_echo "zone_permanent_signatures.at:436" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:436"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlockInversion\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:440" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:440"
    $as_echo "zone_permanent_signatures.at:440" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:440"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlockInversion\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:444"
    $as_echo "zone_permanent_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:444"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlockInversion\">
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:452"
    $as_echo "zone_permanent_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:452"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getRichRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getRichRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRichRules\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:457" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:457"
    $as_echo "zone_permanent_signatures.at:457" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:457"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"setRichRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="setRichRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setRichRules\">
<arg direction=\"in\" name=\"rules\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:462" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:462"
    $as_echo "zone_permanent_signatures.at:462" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:462"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"addRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="addRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRichRule\">
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:467"
    $as_echo "zone_permanent_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:467"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"removeRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="removeRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRichRule\">
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_signatures.at:472" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:472"
    $as_echo "zone_permanent_signatures.at:472" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:472"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:472:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"queryRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:472"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="queryRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRichRule\">
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:472"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_permanent_signatures.at:483" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:483"
    $as_echo "zone_permanent_signatures.at:483" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:483"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"addZone2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addZone2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addZone2\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:491" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:491"
    $as_echo "zone_permanent_signatures.at:491" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:491"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"getSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="getSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings2\">
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_signatures.at:497" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:497"
    $as_echo "zone_permanent_signatures.at:497" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_signatures.at:497"

    { set +x
$as_echo "$at_srcdir/zone_permanent_signatures.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.zone\"]//method[@name=\"update2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_signatures.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.zone"]//method[@name="update2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update2\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_signatures.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "zone_permanent_signatures.at:503" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_signatures.at:503"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_58
#AT_START_59
at_fn_group_banner 59 'zone_runtime_signatures.at:1' \
  "dbus api - zone runtime signatures" "             " 3
at_xfail=no
(
  $as_echo "59. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_runtime_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_runtime_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:1"







    $as_echo "zone_runtime_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:8"
    $as_echo "zone_runtime_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:8"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1\"]//method[@name=\"getZoneSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="getZoneSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneSettings\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"(sssbsasa(ss)asba(ssss)asasasasa(ss)b)\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:16"
    $as_echo "zone_runtime_signatures.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:16"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1\"]//method[@name=\"getDefaultZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="getDefaultZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDefaultZone\">
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:21"
    $as_echo "zone_runtime_signatures.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:21"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1\"]//method[@name=\"setDefaultZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1"]//method[@name="setDefaultZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDefaultZone\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:28"
    $as_echo "zone_runtime_signatures.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:28"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZones\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZones"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZones\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:33"
    $as_echo "zone_runtime_signatures.at:33" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:33"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getActiveZones\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getActiveZones"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getActiveZones\">
<arg direction=\"out\" type=\"a{sa{sas}}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:40"
    $as_echo "zone_runtime_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:40"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZoneOfInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneOfInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfInterface\">
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:46"
    $as_echo "zone_runtime_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:46"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZoneOfSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneOfSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneOfSource\">
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_runtime_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:57"
    $as_echo "zone_runtime_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:57"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"isImmutable\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="isImmutable"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"isImmutable\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:65"
    $as_echo "zone_runtime_signatures.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:65"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:72"
    $as_echo "zone_runtime_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:72"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"InterfaceAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="InterfaceAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"InterfaceAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"interface\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:78"
    $as_echo "zone_runtime_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:78"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"changeZone\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZone"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"changeZone\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:85" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:85"
    $as_echo "zone_runtime_signatures.at:85" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:85"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ZoneChanged\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ZoneChanged"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ZoneChanged\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"interface\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:91" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:91"
    $as_echo "zone_runtime_signatures.at:91" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:91"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"changeZoneOfInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"changeZoneOfInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:98"
    $as_echo "zone_runtime_signatures.at:98" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:98"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:105" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:105"
    $as_echo "zone_runtime_signatures.at:105" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:105"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"InterfaceRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="InterfaceRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"InterfaceRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"interface\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:111" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:111"
    $as_echo "zone_runtime_signatures.at:111" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:111"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryInterface\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryInterface"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInterface\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"interface\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:118" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:118"
    $as_echo "zone_runtime_signatures.at:118" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:118"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getInterfaces\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getInterfaces"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getInterfaces\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:126"
    $as_echo "zone_runtime_signatures.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:126"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:133"
    $as_echo "zone_runtime_signatures.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:133"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourceAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourceAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourceAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"source\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:139"
    $as_echo "zone_runtime_signatures.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:139"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"changeZoneOfSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="changeZoneOfSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"changeZoneOfSource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:146" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:146"
    $as_echo "zone_runtime_signatures.at:146" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:146"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeSource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:153"
    $as_echo "zone_runtime_signatures.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:153"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourceRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourceRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourceRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"source\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:159"
    $as_echo "zone_runtime_signatures.at:159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:159"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"querySource\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySource"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySource\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"source\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:166" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:166"
    $as_echo "zone_runtime_signatures.at:166" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:166"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getSources\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getSources"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSources\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:174"
    $as_echo "zone_runtime_signatures.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:174"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:182"
    $as_echo "zone_runtime_signatures.at:182" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:182"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ServiceAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ServiceAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ServiceAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"service\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:189"
    $as_echo "zone_runtime_signatures.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:189"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeService\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:196" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:196"
    $as_echo "zone_runtime_signatures.at:196" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:196"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ServiceRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ServiceRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ServiceRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"service\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:196"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:202"
    $as_echo "zone_runtime_signatures.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:202"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryService\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryService"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryService\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"service\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:209" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:209"
    $as_echo "zone_runtime_signatures.at:209" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:209"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getServices\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getServices"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServices\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:217"
    $as_echo "zone_runtime_signatures.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:217"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:225" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:225"
    $as_echo "zone_runtime_signatures.at:225" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:225"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ProtocolAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ProtocolAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ProtocolAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:232" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:232"
    $as_echo "zone_runtime_signatures.at:232" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:232"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:239"
    $as_echo "zone_runtime_signatures.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:239"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ProtocolRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ProtocolRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ProtocolRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:245"
    $as_echo "zone_runtime_signatures.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:245"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryProtocol\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryProtocol"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:252"
    $as_echo "zone_runtime_signatures.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:252"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getProtocols\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getProtocols"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:260" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:260"
    $as_echo "zone_runtime_signatures.at:260" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:260"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:269"
    $as_echo "zone_runtime_signatures.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:269"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"PortAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="PortAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PortAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:277"
    $as_echo "zone_runtime_signatures.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:277"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:285" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:285"
    $as_echo "zone_runtime_signatures.at:285" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:285"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"PortRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="PortRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PortRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:292" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:292"
    $as_echo "zone_runtime_signatures.at:292" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:292"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:300"
    $as_echo "zone_runtime_signatures.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:300"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:310" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:310"
    $as_echo "zone_runtime_signatures.at:310" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:310"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:319"
    $as_echo "zone_runtime_signatures.at:319" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:319"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourcePortAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourcePortAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourcePortAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:327"
    $as_echo "zone_runtime_signatures.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:327"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeSourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeSourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:327"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:335" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:335"
    $as_echo "zone_runtime_signatures.at:335" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:335"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"SourcePortRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="SourcePortRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"SourcePortRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:342" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:342"
    $as_echo "zone_runtime_signatures.at:342" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:342"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"querySourcePort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="querySourcePort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:350" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:350"
    $as_echo "zone_runtime_signatures.at:350" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:350"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getSourcePorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getSourcePorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:350"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:360"
    $as_echo "zone_runtime_signatures.at:360" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:360"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addForwardPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:371"
    $as_echo "zone_runtime_signatures.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:371"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ForwardPortAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ForwardPortAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ForwardPortAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"toport\" type=\"s\"></arg>
<arg name=\"toaddr\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:381"
    $as_echo "zone_runtime_signatures.at:381" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:381"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeForwardPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:391" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:391"
    $as_echo "zone_runtime_signatures.at:391" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:391"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"ForwardPortRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="ForwardPortRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ForwardPortRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"port\" type=\"s\"></arg>
<arg name=\"protocol\" type=\"s\"></arg>
<arg name=\"toport\" type=\"s\"></arg>
<arg name=\"toaddr\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:400" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:400"
    $as_echo "zone_runtime_signatures.at:400" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:400"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryForwardPort\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryForwardPort"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryForwardPort\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"port\" type=\"s\"></arg>
<arg direction=\"in\" name=\"protocol\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toport\" type=\"s\"></arg>
<arg direction=\"in\" name=\"toaddr\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:410" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:410"
    $as_echo "zone_runtime_signatures.at:410" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:410"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getForwardPorts\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getForwardPorts"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getForwardPorts\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:420" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:420"
    $as_echo "zone_runtime_signatures.at:420" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:420"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addMasquerade\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:427" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:427"
    $as_echo "zone_runtime_signatures.at:427" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:427"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"MasqueradeAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="MasqueradeAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"MasqueradeAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:433" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:433"
    $as_echo "zone_runtime_signatures.at:433" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:433"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeMasquerade\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:439" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:439"
    $as_echo "zone_runtime_signatures.at:439" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:439"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"MasqueradeRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="MasqueradeRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"MasqueradeRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:444"
    $as_echo "zone_runtime_signatures.at:444" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:444"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryMasquerade\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryMasquerade"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryMasquerade\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:452"
    $as_echo "zone_runtime_signatures.at:452" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:452"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlock\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"icmp\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:460"
    $as_echo "zone_runtime_signatures.at:460" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:460"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"icmp\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:467"
    $as_echo "zone_runtime_signatures.at:467" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:467"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlock\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"icmp\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:474"
    $as_echo "zone_runtime_signatures.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:474"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"icmp\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:480" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:480"
    $as_echo "zone_runtime_signatures.at:480" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:480"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryIcmpBlock\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlock"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlock\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"icmp\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:487" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:487"
    $as_echo "zone_runtime_signatures.at:487" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:487"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getIcmpBlocks\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getIcmpBlocks"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIcmpBlocks\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:495" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:495"
    $as_echo "zone_runtime_signatures.at:495" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:495"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addIcmpBlockInversion\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:501" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:501"
    $as_echo "zone_runtime_signatures.at:501" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:501"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockInversionAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockInversionAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockInversionAdded\">
<arg name=\"zone\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:506" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:506"
    $as_echo "zone_runtime_signatures.at:506" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:506"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeIcmpBlockInversion\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:512" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:512"
    $as_echo "zone_runtime_signatures.at:512" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:512"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"IcmpBlockInversionRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="IcmpBlockInversionRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"IcmpBlockInversionRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:517" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:517"
    $as_echo "zone_runtime_signatures.at:517" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:517"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryIcmpBlockInversion\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryIcmpBlockInversion"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryIcmpBlockInversion\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:525" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:525"
    $as_echo "zone_runtime_signatures.at:525" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:525"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"addRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="addRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRichRule\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"in\" name=\"timeout\" type=\"i\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:533" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:533"
    $as_echo "zone_runtime_signatures.at:533" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:533"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"RichRuleAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="RichRuleAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RichRuleAdded\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"rule\" type=\"s\"></arg>
<arg name=\"timeout\" type=\"i\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:540" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:540"
    $as_echo "zone_runtime_signatures.at:540" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:540"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"removeRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="removeRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRichRule\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:547" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:547"
    $as_echo "zone_runtime_signatures.at:547" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:547"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//signal[@name=\"RichRuleRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//signal[@name="RichRuleRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RichRuleRemoved\">
<arg name=\"zone\" type=\"s\"></arg>
<arg name=\"rule\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:553" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:553"
    $as_echo "zone_runtime_signatures.at:553" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:553"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"queryRichRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="queryRichRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRichRule\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"rule\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_signatures.at:560" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:560"
    $as_echo "zone_runtime_signatures.at:560" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:560"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getRichRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getRichRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRichRules\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_runtime_signatures.at:571" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:571"
    $as_echo "zone_runtime_signatures.at:571" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:571"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"getZoneSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="getZoneSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getZoneSettings2\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_signatures.at:578" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:578"
    $as_echo "zone_runtime_signatures.at:578" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_signatures.at:578"

    { set +x
$as_echo "$at_srcdir/zone_runtime_signatures.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.zone\"]//method[@name=\"setZoneSettings2\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_signatures.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.zone"]//method[@name="setZoneSettings2"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setZoneSettings2\">
<arg direction=\"in\" name=\"zone\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_signatures.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "zone_runtime_signatures.at:585" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_signatures.at:585"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_59
#AT_START_60
at_fn_group_banner 60 'zone_permanent_functional.at:1' \
  "dbus api - zone permanent functional" "           " 3
at_xfail=no
(
  $as_echo "60. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_permanent_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_permanent_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:1"







    $as_echo "zone_permanent_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:8"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone \"foobar\"      '(\"1.0\",        \"foobar\",        \"foobar zone\",        false,        \"ACCEPT\",        [\"ssh\", \"mdns\"],        [(\"1234\", \"tcp\"), (\"1234\", \"udp\")],        [\"echo-request\"],        true,        [(\"1234\", \"tcp\", \"4321\", \"\"), (\"1234\", \"udp\", \"4321\", \"10.10.10.10\")],        [\"dummy0\", \"dummy1\"],        [\"10.10.10.0/24\"],        [\"rule family=ipv4 source address=10.20.20.20 drop\"],        [\"icmp\"],        [(\"1234\", \"tcp\"), (\"1234\", \"udp\")],        false       )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone "foobar"      '("1.0",        "foobar",        "foobar zone",        false,        "ACCEPT",        ["ssh", "mdns"],        [("1234", "tcp"), ("1234", "udp")],        ["echo-request"],        true,        [("1234", "tcp", "4321", ""), ("1234", "udp", "4321", "10.10.10.10")],        ["dummy0", "dummy1"],        ["10.10.10.0/24"],        ["rule family=ipv4 source address=10.20.20.20 drop"],        ["icmp"],        [("1234", "tcp"), ("1234", "udp")],        false       )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_FOOBAR_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_FOOBAR_ZONE_OBJ

if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones |grep "nm-shared" >/dev/null ; then
    NM_SHARED="'nm-shared', "
    export NM_SHARED
fi

    $as_echo "zone_permanent_functional.at:37" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:37"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneNames ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneNames ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['block', 'dmz', 'drop', 'external', 'foobar', 'home', 'internal', ${NM_SHARED}'public', 'trusted', 'work'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:40"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listZones ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listZones ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/['][,]/'\\n/g\" ./stdout |          sed -e \"s/.*config\\/zone\\/\\([^']\\+\\)['].*/\\1/\" |          while read LINE; do { echo \"\${LINE}\" | grep \"^[0-9]\\+\$\" ; } || exit 1; done "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/['][,]/'\n/g" ./stdout |          sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" |          while read LINE; do { echo "${LINE}" | grep "^[0-9]\+$" ; } || exit 1; done
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }



    $as_echo "zone_permanent_functional.at:44" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:44"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/.*config\\/zone\\/\\([^']\\+\\)['].*/\\1/\" ./stdout | grep \"^[0-9]\\+\$\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout | grep "^[0-9]\+$"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --add-interface dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --add-interface dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:49" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:49"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfInterface \"dummy2\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfInterface "dummy2"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-interface dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-interface dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --add-source 10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --add-source 10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:56"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfSource \"10.20.20.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneOfSource "10.20.20.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-source 10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_permanent_functional.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone public --remove-source 10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "zone_permanent_functional.at:65" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:65"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.0', 'foobar', 'foobar zone', false, 'ACCEPT', ['ssh', 'mdns'], [('1234', 'tcp'), ('1234', 'udp')], ['echo-request'], true, [('1234', 'tcp', '4321', ''), ('1234', 'udp', '4321', '10.10.10.10')], ['dummy0', 'dummy1'], ['10.10.10.0/24'], ['rule family=\"ipv4\" source address=\"10.20.20.20\" drop'], ['icmp'], [('1234', 'tcp'), ('1234', 'udp')], false),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:86" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:86"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update      '(\"1.1\",        \"foobar v2\",        \"foobar zone updated\",        false,        \"ACCEPT\",        [\"ssh\", \"mdns\", \"samba\"],        [(\"1234\", \"tcp\"), (\"4444\", \"udp\")],        [\"echo-request\", \"echo-reply\"],        false,        [(\"1234\", \"tcp\", \"4321\", \"\")],        [\"dummy0\", \"dummy1\", \"dummy2\"],        [\"10.10.10.0/24\", \"10.20.0.0/16\"],        [\"rule family=ipv4 source address=10.20.20.20 reject\"],        [\"icmp\", \"ipv6-icmp\"],        [(\"1234\", \"tcp\"), (\"6666\", \"udp\")],        true       )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update      '("1.1",        "foobar v2",        "foobar zone updated",        false,        "ACCEPT",        ["ssh", "mdns", "samba"],        [("1234", "tcp"), ("4444", "udp")],        ["echo-request", "echo-reply"],        false,        [("1234", "tcp", "4321", "")],        ["dummy0", "dummy1", "dummy2"],        ["10.10.10.0/24", "10.20.0.0/16"],        ["rule family=ipv4 source address=10.20.20.20 reject"],        ["icmp", "ipv6-icmp"],        [("1234", "tcp"), ("6666", "udp")],        true       )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:105" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:105"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar v2', 'foobar zone updated', false, 'ACCEPT', ['ssh', 'mdns', 'samba'], [('1234', 'tcp'), ('4444', 'udp')], ['echo-request', 'echo-reply'], false, [('1234', 'tcp', '4321', '')], ['dummy0', 'dummy1', 'dummy2'], ['10.10.10.0/24', '10.20.0.0/16'], ['rule family=\"ipv4\" source address=\"10.20.20.20\" reject'], ['icmp', 'ipv6-icmp'], [('1234', 'tcp'), ('6666', 'udp')], true),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:125"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.rename \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.rename "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:126"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:129" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:129"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.remove ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.remove ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:130" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:130"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/zone_permanent_functional.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:133"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getZoneByName "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_PUBLIC_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_PUBLIC_ZONE_OBJ


    $as_echo "zone_permanent_functional.at:138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:138"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:141" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:141"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:144" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:144"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setVersion \"1.1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setVersion "1.1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:145" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:145"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getVersion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('1.1',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:150" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:150"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('Public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:153" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:153"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setShort \"Public updated\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setShort "Public updated"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:154" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:154"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getShort ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('Public updated',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:154"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:159"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:162" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:162"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setDescription \"A shorter description.\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setDescription "A shorter description."; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:163"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getDescription ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('A shorter description.',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:168"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('default',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:171" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:171"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setTarget \"ACCEPT\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setTarget "ACCEPT"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:172" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:172"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:172:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:172"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getTarget ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('ACCEPT',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:172"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:177" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:177"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addInterface \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addInterface "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:178" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:178"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:181" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:181"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface \"dummy1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryInterface "dummy1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:184" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:184"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:184:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setInterfaces '[\"dummy0\", \"dummy1\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:184"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setInterfaces '["dummy0", "dummy1"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:184"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:185"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy0', 'dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:188" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:188"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:188:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeInterface \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:188"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeInterface "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:188"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:189"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getInterfaces ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:194" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:194"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:194"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:195"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:198" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:198"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource \"10.20.20.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySource "10.20.20.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:201" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:201"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSources '[\"10.10.10.0/24\", \"10.20.20.0/24\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSources '["10.10.10.0/24", "10.20.20.0/24"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:201"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:202" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:202"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.10.10.0/24', '10.20.20.0/24'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:205" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:205"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:205"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:206" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:206"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:206:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:206"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSources ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.20.20.0/24'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:206"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:211" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:211"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addService \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addService "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:212"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:215" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:215"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService \"https\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryService "https"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:218" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:218"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setServices '[\"samba\", \"https\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setServices '["samba", "https"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:218"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:219" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:219"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['samba', 'https'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:219"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:222"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeService \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeService "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:223" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:223"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getServices ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['https'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:228" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:228"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addPort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addPort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:229"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:232" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:232"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort \"4321\" \"udp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryPort "4321" "udp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:235" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:235"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setPorts '[(\"1234\", \"tcp\"), (\"4321\", \"udp\")]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setPorts '[("1234", "tcp"), ("4321", "udp")]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:236" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:236"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('1234', 'tcp'), ('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:239"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:240"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:245" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:245"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSourcePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addSourcePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:246" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:246"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:249" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:249"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort \"4321\" \"udp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.querySourcePort "4321" "udp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:252"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSourcePorts '[(\"1234\", \"tcp\"), (\"4321\", \"udp\")]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setSourcePorts '[("1234", "tcp"), ("4321", "udp")]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:253" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:253"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('1234', 'tcp'), ('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:256" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:256"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSourcePort \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeSourcePort "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:257" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:257"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSourcePorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('4321', 'udp')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:262"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addForwardPort \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addForwardPort "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:263" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:263"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:266" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:266"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort \"4321\" \"udp\" \"4444\" \"10.10.10.10\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryForwardPort "4321" "udp" "4444" "10.10.10.10"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:269"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setForwardPorts '[(\"1234\", \"tcp\", \"1111\", \"\"), (\"4321\", \"udp\", \"4444\", \"10.10.10.10\")]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setForwardPorts '[("1234", "tcp", "1111", ""), ("4321", "udp", "4444", "10.10.10.10")]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:270" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:270"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('1234', 'tcp', '1111', ''), ('4321', 'udp', '4444', '10.10.10.10')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:273" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:273"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeForwardPort \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeForwardPort "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:274" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:274"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getForwardPorts ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([('4321', 'udp', '4444', '10.10.10.10')],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:279" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:279"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addProtocol \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addProtocol "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:280" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:280"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:283" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:283"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol \"igmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryProtocol "igmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:286"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setProtocols '[\"icmp\", \"igmp\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setProtocols '["icmp", "igmp"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:287" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:287"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['icmp', 'igmp'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:290"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeProtocol \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeProtocol "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:291" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:291"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getProtocols ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['igmp'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:296" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:296"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:299" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:299"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:300"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:303" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:303"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setMasquerade true; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setMasquerade true; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:304" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:304"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:307"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:308" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:308"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getMasquerade ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:313" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:313"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlock \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlock "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:314" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:314"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:317" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:317"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock \"echo-request\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlock "echo-request"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:320" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:320"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlocks '[\"echo-reply\", \"echo-request\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlocks '["echo-reply", "echo-request"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:321" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:321"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['echo-reply', 'echo-request'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:324" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:324"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlock \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlock "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:325" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:325"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlocks ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['echo-request'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:330" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:330"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:330"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:333"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:334" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:334"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:334:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:334"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:334"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:337" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:337"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlockInversion true; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setIcmpBlockInversion true; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:338" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:338"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:341" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:341"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:342" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:342"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getIcmpBlockInversion ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:347" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:347"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addRichRule \"rule family=ipv4 source address=10.10.10.0/24 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.addRichRule "rule family=ipv4 source address=10.10.10.0/24 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:347"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:348"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule \"rule family=ipv4 source address=10.10.10.0/24 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule "rule family=ipv4 source address=10.10.10.0/24 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:351" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:351"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule \"rule family=ipv4 source address=10.20.20.0/24 drop\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.queryRichRule "rule family=ipv4 source address=10.20.20.0/24 drop"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:351"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:354" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:354"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setRichRules '[\"rule family=ipv4 source address=10.10.10.0/24 accept\", \"rule family=ipv4 source address=10.20.20.0/24 drop\"]'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.setRichRules '["rule family=ipv4 source address=10.10.10.0/24 accept", "rule family=ipv4 source address=10.20.20.0/24 drop"]'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:355" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:355"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['rule family=\"ipv4\" source address=\"10.10.10.0/24\" accept', 'rule family=\"ipv4\" source address=\"10.20.20.0/24\" drop'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:358" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:358"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeRichRule \"rule family=ipv4 source address=10.10.10.0/24 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.removeRichRule "rule family=ipv4 source address=10.10.10.0/24 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:359" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:359"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_PUBLIC_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getRichRules ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['rule family=\"ipv4\" source address=\"10.20.20.0/24\" drop'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_permanent_functional.at:367" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:367"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone2 \"foobar2\"      '{\"version\": <\"1.0\">,        \"short\": <\"foobar\">,        \"description\": <\"foobar zone\">,        \"target\": <\"ACCEPT\">,        \"services\": <[\"ssh\", \"mdns\"]>,        \"ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <true>,        \"forward\": <false>,        \"forward_ports\": <[(\"1234\", \"tcp\", \"4321\", \"\"), (\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy2\", \"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 drop\"]>,        \"protocols\": <[\"icmp\"]>,        \"source_ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <false>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addZone2 "foobar2"      '{"version": <"1.0">,        "short": <"foobar">,        "description": <"foobar zone">,        "target": <"ACCEPT">,        "services": <["ssh", "mdns"]>,        "ports": <[("1234", "tcp"), ("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <true>,        "forward": <false>,        "forward_ports": <[("1234", "tcp", "4321", ""), ("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy2", "dummy3"]>,        "sources": <["10.10.10.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 drop"]>,        "protocols": <["icmp"]>,        "source_ports": <[("1234", "tcp"), ("1234", "udp")]>,        "icmp_block_inversion": <false>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_FOOBAR2_ZONE_OBJ=$(sed -e "s/.*config\/zone\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_FOOBAR2_ZONE_OBJ


    $as_echo "zone_permanent_functional.at:390" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:390"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar zone'>
'forward': <false>
'forward_ports': <[('1234', 'tcp', '4321', ''), ('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_block_inversion': <false>
'icmp_blocks': <['echo-request']>
'interfaces': <['dummy2', 'dummy3']>
'masquerade': <true>
'ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'protocols': <['icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" drop']>
'services': <['ssh', 'mdns']>
'short': <'foobar'>
'source_ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'sources': <['10.10.10.0/24']>
'target': <'ACCEPT'>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:411" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:411"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.1\">,        \"short\": <\"foobar update2\">,        \"description\": <\"foobar zone update2\">,        \"target\": <\"DROP\">,        \"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\", \"10.30.30.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <true>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.1">,        "short": <"foobar update2">,        "description": <"foobar zone update2">,        "target": <"DROP">,        "services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy3"]>,        "sources": <["10.10.10.0/24", "10.30.30.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "icmp_block_inversion": <true>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:429" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:429"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar zone update2'>
'forward': <false>
'forward_ports': <[('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_block_inversion': <true>
'icmp_blocks': <['echo-request', 'echo-reply']>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update2'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24', '10.30.30.0/24']>
'target': <'DROP'>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_permanent_functional.at:449" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:449"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.2\">,        \"target\": <\"ACCEPT\">       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.2">,        "target": <"ACCEPT">       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:455" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:455"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.3\">,        \"icmp_blocks\": <@as []>,        \"icmp_block_inversion\": <false>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.3">,        "icmp_blocks": <@as []>,        "icmp_block_inversion": <false>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:462" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:462"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{\"version\": <\"1.4\">,        \"forward_ports\": <@a(ssss) []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.update2      '{"version": <"1.4">,        "forward_ports": <@a(ssss) []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_permanent_functional.at:468" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_permanent_functional.at:468"

    { set +x
$as_echo "$at_srcdir/zone_permanent_functional.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/\${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_permanent_functional.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/zone/${DBUS_FOOBAR2_ZONE_OBJ}                            --method org.fedoraproject.FirewallD1.config.zone.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar zone update2'>
'forward': <false>
'icmp_block_inversion': <false>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update2'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24', '10.30.30.0/24']>
'target': <'ACCEPT'>
'version': <'1.4'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_permanent_functional.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_ZONE: foobar-renamed/d'" != x"ignore"; then
            $as_echo "zone_permanent_functional.at:485" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE: foobar-renamed/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_permanent_functional.at:485"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_60
#AT_START_61
at_fn_group_banner 61 'zone_runtime_functional.at:1' \
  "dbus api - zone runtime functional" "             " 3
at_xfail=no
(
  $as_echo "61. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone_runtime_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone_runtime_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:1"







    $as_echo "zone_runtime_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:8"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getZoneSettings \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getZoneSettings "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('', 'Public', 'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.', false, 'default', ['ssh', 'dhcpv6-client'], @a(ss) [], @as [], false, @a(ssss) [], @as [], @as [], @as [], @as [], @a(ss) [], false),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:28"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:31"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.setDefaultZone 'drop'; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.setDefaultZone 'drop'; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "()
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:34" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:34"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getDefaultZone ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }




if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones |grep "nm-shared" >/dev/null ; then
    NM_SHARED="'nm-shared', "
    export NM_SHARED
fi

    $as_echo "zone_runtime_functional.at:43" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:43"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZones ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZones ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['block', 'dmz', 'drop', 'external', 'home', 'internal', ${NM_SHARED}'public', 'trusted', 'work'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --add-source 10.1.1.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --add-source 10.1.1.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:48" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:48"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getActiveZones ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getActiveZones ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'public': {'interfaces': ['dummy0'], 'sources': ['10.1.1.1']}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --remove-source 10.1.1.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --remove-source 10.1.1.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --add-interface dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:56"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfInterface \"dummy1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfInterface "dummy1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone public --remove-interface dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone drop --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone drop --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:61" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:61"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfSource \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneOfSource "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone drop --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone_runtime_functional.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone drop --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "zone_runtime_functional.at:71" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:71"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.isImmutable \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.isImmutable "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:76"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:79" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:79"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZone \"drop\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZone "drop" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:82" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:82"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:85" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:85"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"drop\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "drop" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:88" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:88"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:91" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:91"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:94" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:94"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface \"drop\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryInterface "drop" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:97" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:97"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface \"public\" \"dummy1\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addInterface "public" "dummy1"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:100" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:100"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy0', 'dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:103"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeInterface \"public\" \"dummy0\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeInterface "public" "dummy0"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:106" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:106"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getInterfaces "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['dummy1'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:111" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:111"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:114" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:114"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource \"drop\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource "drop" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('drop',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:117" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:117"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:120" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:120"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource \"drop\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySource "drop" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:123" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:123"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.changeZoneOfSource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:126" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:126"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource \"public\" \"10.20.0.0/16\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSource "public" "10.20.0.0/16"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:129" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:129"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.10.10.0/24', '10.20.0.0/16'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:132" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:132"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSource \"public\" \"10.10.10.0/24\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSource "public" "10.10.10.0/24"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:135" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:135"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSources "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['10.20.0.0/16'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:140"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addService \"public\" \"samba\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addService "public" "samba" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:143" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:143"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService \"public\" \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService "public" "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:146" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:146"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getServices \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getServices "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['ssh', 'dhcpv6-client', 'samba'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:149" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:149"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeService \"public\" \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeService "public" "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:152" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:152"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService \"public\" \"samba\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryService "public" "samba"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:157" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:157"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addProtocol \"public\" \"icmp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addProtocol "public" "icmp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:160" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:160"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol \"public\" \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol "public" "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:163"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getProtocols \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getProtocols "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['icmp'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:166" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:166"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeProtocol \"public\" \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeProtocol "public" "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:169" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:169"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol \"public\" \"icmp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryProtocol "public" "icmp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:174"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort \"public\" \"1234\" \"tcp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort "public" "1234" "tcp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:177" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:177"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:180" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:180"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort \"public\" \"4321\" \"udp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addPort "public" "4321" "udp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:183" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:183"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getPorts \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getPorts "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([['1234', 'tcp'], ['4321', 'udp']],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:186" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:186"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:186"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:189" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:189"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryPort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:194" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:194"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort \"public\" \"1234\" \"tcp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort "public" "1234" "tcp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:194"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:197" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:197"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:197"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:200" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:200"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort \"public\" \"4321\" \"udp\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addSourcePort "public" "4321" "udp" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:200"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:203" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:203"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSourcePorts \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getSourcePorts "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([['1234', 'tcp'], ['4321', 'udp']],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:206" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:206"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:206:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSourcePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:206"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeSourcePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:206"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:209" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:209"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort \"public\" \"1234\" \"tcp\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.querySourcePort "public" "1234" "tcp"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:209"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:214" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:214"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort "public" "1234" "tcp" "1111" "" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:214"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:217"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort "public" "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:220" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:220"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:220:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort \"public\" \"4321\" \"udp\" \"4444\" \"10.10.10.10\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:220"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addForwardPort "public" "4321" "udp" "4444" "10.10.10.10" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:220"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:223" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:223"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getForwardPorts \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getForwardPorts "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "([['1234', 'tcp', '1111', ''], ['4321', 'udp', '4444', '10.10.10.10']],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:226"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeForwardPort "public" "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:229" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:229"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort \"public\" \"1234\" \"tcp\" \"1111\" \"\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryForwardPort "public" "1234" "tcp" "1111" ""; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:234"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addMasquerade \"public\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addMasquerade "public" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:237" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:237"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:240" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:240"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeMasquerade \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeMasquerade "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:243" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:243"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryMasquerade "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:248" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:248"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock \"public\" \"echo-reply\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock "public" "echo-reply" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:251" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:251"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock \"public\" \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock "public" "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:254" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:254"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock \"public\" \"echo-request\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlock "public" "echo-request" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:257" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:257"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getIcmpBlocks \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getIcmpBlocks "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['echo-reply', 'echo-request'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:260" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:260"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlock \"public\" \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlock "public" "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:263" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:263"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock \"public\" \"echo-reply\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlock "public" "echo-reply"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:268" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:268"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:271" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:271"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:274" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:274"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:277" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:277"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryIcmpBlockInversion "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:282" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:282"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:285" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:285"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:288" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:288"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getRichRules \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getRichRules "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['rule family=\"ipv4\" source address=\"10.10.10.10\" accept'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:291" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:291"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule \"public\" \"rule family=ipv4 source address=20.20.20.20 accept\" 0; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.addRichRule "public" "rule family=ipv4 source address=20.20.20.20 accept" 0; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:294" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:294"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule \"public\" \"rule family=ipv4 source address=20.20.20.20 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule "public" "rule family=ipv4 source address=20.20.20.20 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(true,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:297" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:297"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.removeRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "('public',)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:300" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:300"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule \"public\" \"rule family=ipv4 source address=10.10.10.10 accept\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.queryRichRule "public" "rule family=ipv4 source address=10.10.10.10 accept"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(false,)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "zone_runtime_functional.at:308" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:308"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'>
'forward': <true>
'forward_ports': <[('4321', 'udp', '4444', '10.10.10.10')]>
'icmp_block_inversion': <false>
'icmp_blocks': <['echo-request']>
'interfaces': <['dummy1']>
'masquerade': <false>
'ports': <[('4321', 'udp')]>
'rules_str': <['rule family=\"ipv4\" source address=\"20.20.20.20\" accept']>
'services': <['ssh', 'dhcpv6-client']>
'short': <'Public'>
'source_ports': <[('4321', 'udp')]>
'sources': <['10.20.0.0/16']>
'target': <'default'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:327"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <true>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy3"]>,        "sources": <["10.10.10.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "icmp_block_inversion": <true>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:327"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:343" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:343"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'>
'forward': <false>
'forward_ports': <[('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_block_inversion': <true>
'icmp_blocks': <['echo-reply', 'echo-request']>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'rules_str': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'Public'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24']>
'target': <'default'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:361" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:361"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"interfaces\": <[\"dummy3\"]>,        \"sources\": <[\"10.10.10.0/24\"]>,        \"rules_str\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"icmp_block_inversion\": <true>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "interfaces": <["dummy3"]>,        "sources": <["10.10.10.0/24"]>,        "rules_str": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "icmp_block_inversion": <true>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "zone_runtime_functional.at:378" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:378"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <[\"mdns\", \"ssh\"]>,        \"icmp_blocks\": <[\"echo-reply\"]>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <["mdns", "ssh"]>,        "icmp_blocks": <["echo-reply"]>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:385"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"rules_str\": <@as []>,        \"icmp_block_inversion\": <false>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"rules_str": <@as []>,        "icmp_block_inversion": <false>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:392" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:392"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"forward_ports\": <@a(ssss) []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"forward_ports": <@a(ssss) []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:398" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:398"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     \"public\"      '{\"services\": <@as []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.setZoneSettings2     "public"      '{"services": <@as []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "zone_runtime_functional.at:404" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone_runtime_functional.at:404"

    { set +x
$as_echo "$at_srcdir/zone_runtime_functional.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 \"public\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone_runtime_functional.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.zone.getZoneSettings2 "public"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted.'>
'forward': <false>
'icmp_block_inversion': <false>
'icmp_blocks': <['echo-reply']>
'interfaces': <['dummy3']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'protocols': <['ipv6-icmp']>
'short': <'Public'>
'source_ports': <[('1234', 'udp')]>
'sources': <['10.10.10.0/24']>
'target': <'default'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone_runtime_functional.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "zone_runtime_functional.at:419" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone_runtime_functional.at:419"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_61
#AT_START_62
at_fn_group_banner 62 'policy_permanent_signatures.at:1' \
  "dbus api - policy permanent signatures" "         " 3
at_xfail=no
(
  $as_echo "62. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_permanent_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_permanent_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_permanent_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:1"







    $as_echo "policy_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:8"
    $as_echo "policy_permanent_signatures.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:8"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"listPolicies\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="listPolicies"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"listPolicies\">
<arg direction=\"out\" type=\"ao\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:13"
    $as_echo "policy_permanent_signatures.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:13"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getPolicyNames\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getPolicyNames"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicyNames\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:18"
    $as_echo "policy_permanent_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:18"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"getPolicyByName\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="getPolicyByName"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicyByName\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:24"
    $as_echo "policy_permanent_signatures.at:24" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:24"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config\"]//method[@name=\"addPolicy\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config"]//method[@name="addPolicy"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPolicy\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
<arg direction=\"out\" type=\"o\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "policy_permanent_signatures.at:36" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:36"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_POLICY_OBJ=$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_POLICY_OBJ


    $as_echo "policy_permanent_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:40"
    $as_echo "policy_permanent_signatures.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:40"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:46"
    $as_echo "policy_permanent_signatures.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:46"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:51" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:51"
    $as_echo "policy_permanent_signatures.at:51" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:51"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//signal[@name=\"Updated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Updated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Updated\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:57"
    $as_echo "policy_permanent_signatures.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:57"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"remove\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="remove"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:61" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:61"
    $as_echo "policy_permanent_signatures.at:61" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:61"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//signal[@name=\"Removed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Removed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Removed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:67"
    $as_echo "policy_permanent_signatures.at:67" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:67"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"rename\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="rename"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:72"
    $as_echo "policy_permanent_signatures.at:72" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:72"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//signal[@name=\"Renamed\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//signal[@name="Renamed"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Renamed\">
<arg name=\"name\" type=\"s\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:78"
    $as_echo "policy_permanent_signatures.at:78" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_signatures.at:78"

    { set +x
$as_echo "$at_srcdir/policy_permanent_signatures.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_POLICY_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.policy\"]//method[@name=\"loadDefaults\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_signatures.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_POLICY_OBJ}; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.policy"]//method[@name="loadDefaults"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_signatures.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "policy_permanent_signatures.at:83" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_signatures.at:83"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_62
#AT_START_63
at_fn_group_banner 63 'policy_runtime_signatures.at:1' \
  "dbus api - policy runtime signatures" "           " 3
at_xfail=no
(
  $as_echo "63. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_runtime_signatures.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_signatures.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_signatures.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_runtime_signatures.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_runtime_signatures.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:1"






    $as_echo "policy_runtime_signatures.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:6"
    $as_echo "policy_runtime_signatures.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:6"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"getPolicySettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicySettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicySettings\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_signatures.at:12" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:12"
    $as_echo "policy_runtime_signatures.at:12" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:12"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"setPolicySettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="setPolicySettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPolicySettings\">
<arg direction=\"in\" name=\"policy\" type=\"s\"></arg>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:18"
    $as_echo "policy_runtime_signatures.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:18"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//signal[@name=\"PolicyUpdated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//signal[@name="PolicyUpdated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PolicyUpdated\">
<arg name=\"policy\" type=\"s\"></arg>
<arg name=\"settings\" type=\"a{sv}\"></arg>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_signatures.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:26"
    $as_echo "policy_runtime_signatures.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:26"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"getPolicies\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getPolicies"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPolicies\">
<arg direction=\"out\" type=\"as\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_signatures.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:31"
    $as_echo "policy_runtime_signatures.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_signatures.at:31"

    { set +x
$as_echo "$at_srcdir/policy_runtime_signatures.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.policy\"]//method[@name=\"getActivePolicies\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_signatures.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.policy"]//method[@name="getActivePolicies"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getActivePolicies\">
<arg direction=\"out\" type=\"a{sa{sas}}\"></arg>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_signatures.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "policy_runtime_signatures.at:37" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_signatures.at:37"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_63
#AT_START_64
at_fn_group_banner 64 'policy_permanent_functional.at:1' \
  "dbus api - policy permanent functional" "         " 3
at_xfail=no
(
  $as_echo "64. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_permanent_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_permanent_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_permanent_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_permanent_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:1"







    $as_echo "policy_permanent_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:8"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listPolicies ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.listPolicies ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/['][,]/'\\n/g\" ./stdout |          sed -e \"s/.*config\\/policy\\/\\([^']\\+\\)['].*/\\1/\" |          while read LINE; do { echo \"\${LINE}\" | grep \"^[0-9]\\+\$\" ; } || exit 1; done "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/['][,]/'\n/g" ./stdout |          sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" |          while read LINE; do { echo "${LINE}" | grep "^[0-9]\+$" ; } || exit 1; done
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:13"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyNames ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyNames ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['allow-host-ipv6'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:17"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sed -e \"s/.*config\\/policy\\/\\([^']\\+\\)['].*/\\1/\" ./stdout | grep \"^[0-9]\\+\$\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_permanent_functional.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout | grep "^[0-9]\+$"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:20"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addPolicy \"foobar\"      '{\"version\": <\"1.0\">,        \"short\": <\"foobar\">,        \"description\": <\"foobar policy\">,        \"target\": <\"CONTINUE\">,        \"services\": <[\"ssh\", \"mdns\"]>,        \"ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"tcp\", \"4321\", \"\"), (\"1234\", \"udp\", \"4321\", \"\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 drop\"]>,        \"protocols\": <[\"icmp\"]>,        \"source_ports\": <[(\"1234\", \"tcp\"), (\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"public\"]>,        \"egress_zones\": <[\"HOST\"]>,        \"priority\": <-100>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addPolicy "foobar"      '{"version": <"1.0">,        "short": <"foobar">,        "description": <"foobar policy">,        "target": <"CONTINUE">,        "services": <["ssh", "mdns"]>,        "ports": <[("1234", "tcp"), ("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "tcp", "4321", ""), ("1234", "udp", "4321", "")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 drop"]>,        "protocols": <["icmp"]>,        "source_ports": <[("1234", "tcp"), ("1234", "udp")]>,        "ingress_zones": <["public"]>,        "egress_zones": <["HOST"]>,        "priority": <-100>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_FOOBAR_POLICY_OBJ=$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_FOOBAR_POLICY_OBJ



    $as_echo "policy_permanent_functional.at:46" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:46"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar policy'>
'egress_zones': <['HOST']>
'forward_ports': <[('1234', 'tcp', '4321', ''), ('1234', 'udp', '4321', '')]>
'icmp_blocks': <['echo-request']>
'ingress_zones': <['public']>
'masquerade': <false>
'ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'priority': <-100>
'protocols': <['icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" drop']>
'services': <['ssh', 'mdns']>
'short': <'foobar'>
'source_ports': <[('1234', 'tcp'), ('1234', 'udp')]>
'target': <'CONTINUE'>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:66" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:66"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.1\">,        \"short\": <\"foobar update\">,        \"description\": <\"foobar policy update\">,        \"target\": <\"DROP\">,        \"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\", \"echo-reply\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"10.10.10.10\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"public\", \"external\"]>,        \"egress_zones\": <[\"internal\"]>,        \"priority\": <200>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.1">,        "short": <"foobar update">,        "description": <"foobar policy update">,        "target": <"DROP">,        "services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request", "echo-reply"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "10.10.10.10")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_zones": <["public", "external"]>,        "egress_zones": <["internal"]>,        "priority": <200>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:84" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:84"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar policy update'>
'egress_zones': <['internal']>
'forward_ports': <[('1234', 'udp', '4321', '10.10.10.10')]>
'icmp_blocks': <['echo-request', 'echo-reply']>
'ingress_zones': <['public', 'external']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <200>
'protocols': <['ipv6-icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update'>
'source_ports': <[('1234', 'udp')]>
'target': <'DROP'>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:103"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.2\">,        \"target\": <\"DROP\">       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.2">,        "target": <"DROP">       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:109" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:109"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.3\">,        \"icmp_blocks\": <@as []>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.3">,        "icmp_blocks": <@as []>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:115" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:115"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.4\">,        \"forward_ports\": <@a(ssss) []>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.4">,        "forward_ports": <@a(ssss) []>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:121" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:121"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar policy update'>
'egress_zones': <['internal']>
'ingress_zones': <['public', 'external']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <200>
'protocols': <['ipv6-icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'foobar update'>
'source_ports': <[('1234', 'udp')]>
'target': <'DROP'>
'version': <'1.4'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:137" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:137"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.rename \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.rename "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:138"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:140" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:140"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.remove ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_FOOBAR_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.remove ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:141" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:141"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"foobar-renamed\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "foobar-renamed"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy_permanent_functional.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:144" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:144"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.getPolicyByName "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }



DBUS_BUILTIN_POLICY_OBJ=$(sed -e "s/.*config\/policy\/\([^']\+\)['].*/\1/" ./stdout)
export DBUS_BUILTIN_POLICY_OBJ

    $as_echo "policy_permanent_functional.at:147" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:147"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{\"version\": <\"1.2\">,        \"target\": <\"DROP\">       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.update      '{"version": <"1.2">,        "target": <"DROP">       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:152" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:152"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'priority': <-15000>
'rich_rules': <['rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept', 'rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"redirect\" accept']>
'short': <'Allow host IPv6'>
'target': <'DROP'>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_permanent_functional.at:164" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:164"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.loadDefaults ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.loadDefaults ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_permanent_functional.at:165" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_permanent_functional.at:165"

    { set +x
$as_echo "$at_srcdir/policy_permanent_functional.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/\${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_permanent_functional.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/policy/${DBUS_BUILTIN_POLICY_OBJ}                            --method org.fedoraproject.FirewallD1.config.policy.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'priority': <-15000>
'rich_rules': <['rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept', 'rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"redirect\" accept']>
'short': <'Allow host IPv6'>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_permanent_functional.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_POLICY: foobar-renamed/d'" != x"ignore"; then
            $as_echo "policy_permanent_functional.at:176" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_POLICY: foobar-renamed/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_permanent_functional.at:176"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_64
#AT_START_65
at_fn_group_banner 65 'policy_runtime_functional.at:1' \
  "dbus api - policy runtime functional" "           " 3
at_xfail=no
(
  $as_echo "65. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy_runtime_functional.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy_runtime_functional.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy_runtime_functional.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy_runtime_functional.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:1"







    $as_echo "policy_runtime_functional.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:8"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'priority': <-15000>
'rich_rules': <['rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept', 'rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept', 'rule family=\"ipv6\" icmp-type name=\"redirect\" accept']>
'short': <'Allow host IPv6'>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_functional.at:21" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:21"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"ANY\"]>,        \"egress_zones\": <[\"HOST\"]>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_zones": <["ANY"]>,        "egress_zones": <["HOST"]>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:35"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'forward_ports': <[('1234', 'udp', '4321', '')]>
'icmp_blocks': <['echo-request']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <-15000>
'protocols': <['ipv6-icmp']>
'rich_rules': <['rule family=\"ipv4\" source address=\"10.20.20.20\" accept']>
'services': <['mdns']>
'short': <'Allow host IPv6'>
'source_ports': <[('1234', 'udp')]>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:52"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"services\": <[\"mdns\"]>,        \"ports\": <[(\"1234\", \"udp\")]>,        \"icmp_blocks\": <[\"echo-request\"]>,        \"masquerade\": <false>,        \"forward_ports\": <[(\"1234\", \"udp\", \"4321\", \"\")]>,        \"rich_rules\": <[\"rule family=ipv4 source address=10.20.20.20 accept\"]>,        \"protocols\": <[\"ipv6-icmp\"]>,        \"source_ports\": <[(\"1234\", \"udp\")]>,        \"ingress_zones\": <[\"ANY\"]>,        \"egress_zones\": <[\"HOST\"]>       }'     ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"services": <["mdns"]>,        "ports": <[("1234", "udp")]>,        "icmp_blocks": <["echo-request"]>,        "masquerade": <false>,        "forward_ports": <[("1234", "udp", "4321", "")]>,        "rich_rules": <["rule family=ipv4 source address=10.20.20.20 accept"]>,        "protocols": <["ipv6-icmp"]>,        "source_ports": <[("1234", "udp")]>,        "ingress_zones": <["ANY"]>,        "egress_zones": <["HOST"]>       }'     ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_functional.at:68" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:68"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"services\": <[\"mdns\", \"ssh\"]>,        \"icmp_blocks\": <[\"echo-reply\"]>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"services": <["mdns", "ssh"]>,        "icmp_blocks": <["echo-reply"]>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:75" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:75"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"rich_rules\": <@as []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"rich_rules": <@as []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:81" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:81"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     \"allow-host-ipv6\"      '{\"forward_ports\": <@a(ssss) []>       }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.setPolicySettings     "allow-host-ipv6"      '{"forward_ports": <@a(ssss) []>       }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "policy_runtime_functional.at:87" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:87"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings \"allow-host-ipv6\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicySettings "allow-host-ipv6"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'Allows basic IPv6 functionality for the host running firewalld.'>
'egress_zones': <['HOST']>
'icmp_blocks': <['echo-reply']>
'ingress_zones': <['ANY']>
'masquerade': <false>
'ports': <[('1234', 'udp')]>
'priority': <-15000>
'protocols': <['ipv6-icmp']>
'services': <['mdns', 'ssh']>
'short': <'Allow host IPv6'>
'source_ports': <[('1234', 'udp')]>
'target': <'CONTINUE'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy_runtime_functional.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }








    $as_echo "policy_runtime_functional.at:108" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:108"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicies ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getPolicies ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(['allow-host-ipv6'],)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "policy_runtime_functional.at:112" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy_runtime_functional.at:112"

    { set +x
$as_echo "$at_srcdir/policy_runtime_functional.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getActivePolicies ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy_runtime_functional.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.policy.getActivePolicies ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'allow-host-ipv6': {'ingress_zones': ['ANY'], 'egress_zones': ['HOST']}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy_runtime_functional.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "policy_runtime_functional.at:116" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy_runtime_functional.at:116"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_65
#AT_START_66
at_fn_group_banner 66 'direct.at:1' \
  "dbus api - direct signatures" "                   " 3
at_xfail=no
(
  $as_echo "66. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/direct.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/direct.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "direct.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/direct.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "direct.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/direct.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "direct.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/direct.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/direct.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/direct.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "direct.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/direct.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/direct.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "direct.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "direct.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/direct.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "direct.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/direct.at:1"







    $as_echo "direct.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:8"
    $as_echo "direct.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:8"

    { set +x
$as_echo "$at_srcdir/direct.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="addChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:17"
    $as_echo "direct.at:17" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:17"

    { set +x
$as_echo "$at_srcdir/direct.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="addPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:25" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:25"
    $as_echo "direct.at:25" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:25"

    { set +x
$as_echo "$at_srcdir/direct.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="addRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:36" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:36"
    $as_echo "direct.at:36" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:36"

    { set +x
$as_echo "$at_srcdir/direct.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getAllChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getAllChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllChains\">
<arg direction=\"out\" type=\"a(sss)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:43" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:43"
    $as_echo "direct.at:43" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:43"

    { set +x
$as_echo "$at_srcdir/direct.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getAllPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getAllPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllPassthroughs\">
<arg direction=\"out\" type=\"a(sas)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:50" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:50"
    $as_echo "direct.at:50" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:50"

    { set +x
$as_echo "$at_srcdir/direct.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getAllRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getAllRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllRules\">
<arg direction=\"out\" type=\"a(sssias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:57"
    $as_echo "direct.at:57" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:57"

    { set +x
$as_echo "$at_srcdir/direct.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getChains\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:66" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:66"
    $as_echo "direct.at:66" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:66"

    { set +x
$as_echo "$at_srcdir/direct.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPassthroughs\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:74" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:74"
    $as_echo "direct.at:74" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:74"

    { set +x
$as_echo "$at_srcdir/direct.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a(ias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:84" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:84"
    $as_echo "direct.at:84" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:84"

    { set +x
$as_echo "$at_srcdir/direct.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"passthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="passthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"passthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:93"
    $as_echo "direct.at:93" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:93"

    { set +x
$as_echo "$at_srcdir/direct.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:103"
    $as_echo "direct.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:103"

    { set +x
$as_echo "$at_srcdir/direct.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:112" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:112"
    $as_echo "direct.at:112" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:112"

    { set +x
$as_echo "$at_srcdir/direct.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:124" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:124"
    $as_echo "direct.at:124" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:124"

    { set +x
$as_echo "$at_srcdir/direct.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeAllPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeAllPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeAllPassthroughs\">
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:130" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:130"
    $as_echo "direct.at:130" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:130"

    { set +x
$as_echo "$at_srcdir/direct.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:139"
    $as_echo "direct.at:139" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:139"

    { set +x
$as_echo "$at_srcdir/direct.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removePassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removePassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:147" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:147"
    $as_echo "direct.at:147" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:147"

    { set +x
$as_echo "$at_srcdir/direct.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:158"
    $as_echo "direct.at:158" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:158"

    { set +x
$as_echo "$at_srcdir/direct.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:167"
    $as_echo "direct.at:167" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:167"

    { set +x
$as_echo "$at_srcdir/direct.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"ChainAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="ChainAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ChainAdded\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:176" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:176"
    $as_echo "direct.at:176" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:176"

    { set +x
$as_echo "$at_srcdir/direct.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"ChainRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="ChainRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"ChainRemoved\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:185"
    $as_echo "direct.at:185" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:185"

    { set +x
$as_echo "$at_srcdir/direct.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"PassthroughAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="PassthroughAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PassthroughAdded\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:193" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:193"
    $as_echo "direct.at:193" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:193"

    { set +x
$as_echo "$at_srcdir/direct.at:193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"PassthroughRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="PassthroughRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"PassthroughRemoved\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:201" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:201"
    $as_echo "direct.at:201" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:201"

    { set +x
$as_echo "$at_srcdir/direct.at:201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"RuleAdded\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="RuleAdded"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RuleAdded\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<arg name=\"priority\" type=\"i\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:201"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:212"
    $as_echo "direct.at:212" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:212"

    { set +x
$as_echo "$at_srcdir/direct.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//signal[@name=\"RuleRemoved\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//signal[@name="RuleRemoved"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"RuleRemoved\">
<arg name=\"ipv\" type=\"s\"></arg>
<arg name=\"table\" type=\"s\"></arg>
<arg name=\"chain\" type=\"s\"></arg>
<arg name=\"priority\" type=\"i\"></arg>
<arg name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "direct.at:227" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:227"
    $as_echo "direct.at:227" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:227"

    { set +x
$as_echo "$at_srcdir/direct.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getSettings\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getSettings"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(a(sss)a(sssias)a(sas))\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:234"
    $as_echo "direct.at:234" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:234"

    { set +x
$as_echo "$at_srcdir/direct.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"update\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="update"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(a(sss)a(sssias)a(sas))\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:241" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:241"
    $as_echo "direct.at:241" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:241"

    { set +x
$as_echo "$at_srcdir/direct.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"addChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:250"
    $as_echo "direct.at:250" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:250"

    { set +x
$as_echo "$at_srcdir/direct.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"addPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:258" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:258"
    $as_echo "direct.at:258" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:258"

    { set +x
$as_echo "$at_srcdir/direct.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"addRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="addRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:269"
    $as_echo "direct.at:269" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:269"

    { set +x
$as_echo "$at_srcdir/direct.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getAllChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllChains\">
<arg direction=\"out\" type=\"a(sss)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:276" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:276"
    $as_echo "direct.at:276" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:276"

    { set +x
$as_echo "$at_srcdir/direct.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getAllPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllPassthroughs\">
<arg direction=\"out\" type=\"a(sas)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:283" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:283"
    $as_echo "direct.at:283" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:283"

    { set +x
$as_echo "$at_srcdir/direct.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getAllRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getAllRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getAllRules\">
<arg direction=\"out\" type=\"a(sssias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:290"
    $as_echo "direct.at:290" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:290"

    { set +x
$as_echo "$at_srcdir/direct.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getChains\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getChains"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getChains\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"out\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:299" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:299"
    $as_echo "direct.at:299" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:299"

    { set +x
$as_echo "$at_srcdir/direct.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getPassthroughs\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getPassthroughs"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPassthroughs\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"out\" type=\"aas\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:307"
    $as_echo "direct.at:307" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:307"

    { set +x
$as_echo "$at_srcdir/direct.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"getRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="getRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"a(ias)\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:317" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:317"
    $as_echo "direct.at:317" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:317"

    { set +x
$as_echo "$at_srcdir/direct.at:317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"queryChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:317"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:327"
    $as_echo "direct.at:327" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:327"

    { set +x
$as_echo "$at_srcdir/direct.at:327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"queryPassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryPassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:327"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:336" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:336"
    $as_echo "direct.at:336" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:336"

    { set +x
$as_echo "$at_srcdir/direct.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"queryRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="queryRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<arg direction=\"out\" type=\"b\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:348"
    $as_echo "direct.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:348"

    { set +x
$as_echo "$at_srcdir/direct.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removeChain\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeChain"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeChain\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:357" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:357"
    $as_echo "direct.at:357" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:357"

    { set +x
$as_echo "$at_srcdir/direct.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removePassthrough\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removePassthrough"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePassthrough\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:365" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:365"
    $as_echo "direct.at:365" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:365"

    { set +x
$as_echo "$at_srcdir/direct.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removeRule\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeRule"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRule\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<arg direction=\"in\" name=\"priority\" type=\"i\"></arg>
<arg direction=\"in\" name=\"args\" type=\"as\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:376"
    $as_echo "direct.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:376"

    { set +x
$as_echo "$at_srcdir/direct.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//method[@name=\"removeRules\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//method[@name="removeRules"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeRules\">
<arg direction=\"in\" name=\"ipv\" type=\"s\"></arg>
<arg direction=\"in\" name=\"table\" type=\"s\"></arg>
<arg direction=\"in\" name=\"chain\" type=\"s\"></arg>
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "direct.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:385"
    $as_echo "direct.at:385" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/direct.at:385"

    { set +x
$as_echo "$at_srcdir/direct.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//interface[@name=\"org.fedoraproject.FirewallD1.config.direct\"]//signal[@name=\"Updated\"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "direct.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//interface[@name="org.fedoraproject.FirewallD1.config.direct"]//signal[@name="Updated"]' - | xmllint --format - | xmllint --c14n - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<signal name=\"Updated\">
<annotation name=\"org.freedesktop.DBus.Deprecated\" value=\"true\"></annotation>
</signal>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/direct.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "direct.at:391" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/direct.at:391"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_66
#AT_START_67
at_fn_group_banner 67 'firewall-cmd.at:5' \
  "basic options" "                                  " 4
at_xfail=no
(
  $as_echo "67. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --help "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -V "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_67
#AT_START_68
at_fn_group_banner 68 'firewall-cmd.at:28' \
  "get/list options" "                               " 4
at_xfail=no
(
  $as_echo "68. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_68
#AT_START_69
at_fn_group_banner 69 'firewall-cmd.at:44' \
  "default zone" "                                   " 4
at_xfail=no
(
  $as_echo "69. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_69
#AT_START_70
at_fn_group_banner 70 'firewall-cmd.at:56' \
  "user zone" "                                      " 4
at_xfail=no
(
  $as_echo "70. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/firewall-cmd.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_TARGET: BAD/d'              -e '/ERROR: INVALID_NAME: Zone of/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:73" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TARGET: BAD/d'              -e '/ERROR: INVALID_NAME: Zone of/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:73"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_70
#AT_START_71
at_fn_group_banner 71 'firewall-cmd.at:76' \
  "zone interfaces" "                                " 4
at_xfail=no
(
  $as_echo "71. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:76"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:76"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:76"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:76"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:76"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:76"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=bar --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-interface foo --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-interface foo --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-interface bar --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-interface bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=bar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=trusted --add-interface=+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=trusted --add-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:154"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
iifname \"foobar*\" goto filter_IN_public
iifname \"foobar++*\" goto filter_IN_public
goto filter_IN_trusted
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=trusted --remove-interface=+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=trusted --remove-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:172" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:172"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_71
#AT_START_72
at_fn_group_banner 72 'firewall-cmd.at:174' \
  "zone sources" "                                   " 4
at_xfail=no
(
  $as_echo "72. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:174"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:174"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:174"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:174"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:174"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:174"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:224" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed  -e '/ERROR: ZONE_CONFLICT/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:224"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_72
#AT_START_73
at_fn_group_banner 73 'firewall-cmd.at:226' \
  "services" "                                       " 4
at_xfail=no
(
  $as_echo "73. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:226"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:226"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:226"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:268" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:268"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_73
#AT_START_74
at_fn_group_banner 74 'firewall-cmd.at:270' \
  "user services" "                                  " 4
at_xfail=no
(
  $as_echo "74. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:270"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:270"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:270"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:312"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:322:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:322"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:322"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:334:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:334"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:334"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF




        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_74
#AT_START_75
at_fn_group_banner 75 'firewall-cmd.at:352' \
  "ports" "                                          " 4
at_xfail=no
(
  $as_echo "75. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:352"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:352"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:352"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:407" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:407"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_75
#AT_START_76
at_fn_group_banner 76 'firewall-cmd.at:409' \
  "source ports" "                                   " 4
at_xfail=no
(
  $as_echo "76. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:409"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:409"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:409"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:415:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:415"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:415"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:444" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:444"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_76
#AT_START_77
at_fn_group_banner 77 'firewall-cmd.at:446' \
  "protocols" "                                      " 4
at_xfail=no
(
  $as_echo "77. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:446"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:446"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:446"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:458:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:458"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:472" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:472"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_77
#AT_START_78
at_fn_group_banner 78 'firewall-cmd.at:474' \
  "masquerade" "                                     " 4
at_xfail=no
(
  $as_echo "78. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:474"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:474"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:474"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:474"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:474"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:474"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_public_allow {
meta nfproto ipv4 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:499" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:499"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_78
#AT_START_79
at_fn_group_banner 79 'firewall-cmd.at:501' \
  "forward" "                                        " 4
at_xfail=no
(
  $as_echo "79. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:501"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:501"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:501"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
oifname \"dummy2\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
oifname \"dummy3\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:561:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:561"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:561"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:579"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_home_allow {
oifname \"dummy\" accept
oifname \"dummy3\" accept
ip daddr 10.10.10.0/24 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:600"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone |grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone |grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-interface dummy4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-interface dummy4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:607:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:607"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
oifname \"dummy4\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:607"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:626"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:627:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:627"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
ip daddr 10.10.10.0/24 accept
ip6 daddr 1234::/64 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:627"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:644:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:644"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
ip daddr 10.10.10.0/24 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:644"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:656:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:656"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:656"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:657:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:657"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:657"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:660"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
ip daddr 10.10.10.0/24 accept
ip daddr 10.20.20.0/24 accept
ip6 daddr 4321::/64 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:676"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_internal_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:677"
$at_failed && at_fn_log_failure
$at_traceon; }














        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:687" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:687"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_79
#AT_START_80
at_fn_group_banner 80 'firewall-cmd.at:689' \
  "forward ports" "                                  " 4
at_xfail=no
(
  $as_echo "80. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:689"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:689"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:689"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:692"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:693"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv4 tcp dport 11 redirect to :22
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:695"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:709"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv4 tcp dport 33 dnat ip to 4.4.4.4
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:723"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:725"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:727"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:730:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:730"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:730"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:731"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv6 sctp dport 66 dnat ip6 to [fd00:dead:beef:ff0::]:66
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:754"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:755:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:755"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:755"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:757"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:760:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:760"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:761"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:762"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:783"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:784"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:786" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:786"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_80
#AT_START_81
at_fn_group_banner 81 'firewall-cmd.at:788' \
  "ICMP block" "                                     " 4
at_xfail=no
(
  $as_echo "81. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:788"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:788"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:788"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:818"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:820:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:820"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:820"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:829"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_81
#AT_START_82
at_fn_group_banner 82 'firewall-cmd.at:834' \
  "user ICMP types" "                                " 4
at_xfail=no
(
  $as_echo "82. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:834"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:834"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:834"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:834"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:834"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:834"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:843"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:846"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:847"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:850"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:853:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:853"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:853"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:855" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/NAME_CONFLICT: new_icmptype():/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:855"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_82
#AT_START_83
at_fn_group_banner 83 'firewall-cmd.at:857' \
  "ipset" "                                          " 4
at_xfail=no
(
  $as_echo "83. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:857"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:857"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:857"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"
                $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"
                $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"
        $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"

                $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"
                $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:863:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:863"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:863"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:865"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:869"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:871"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:877:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:877"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:877"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:878"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:882"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:889:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:889"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . inet_proto . inet_service
flags interval
elements = { 10.10.10.10 . tcp . 1234,
10.10.10.10 . tcp . 2000-2100 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:889"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:910:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:910"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . inet_proto . inet_service
flags interval
elements = { 10.10.10.10 . sctp . 1234,
10.10.10.10 . udp . 1000-1002,
20.20.20.20 . tcp . 8080 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:910"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:921:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:921"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip saddr . meta l4proto . th sport @foobar goto filter_IN_internal
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:921"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:929:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:929"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,port
Members:
10.10.10.10,sctp:1234
10.10.10.10,udp:1000
10.10.10.10,udp:1001
10.10.10.10,udp:1002
20.20.20.20,tcp:8080
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:929"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:944:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:944"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:944"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . mark
flags interval
elements = { 10.10.10.10 . 0x00000100,
20.20.20.20 . 0x00000200 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip saddr . mark @foobar goto filter_IN_internal
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:959"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,mark
Members:
10.10.10.10,0x00000100
20.20.20.20,0x00000200
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:967"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:974"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:978:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:978"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:978"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:981"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:982:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:982"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:982"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:989:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:989"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:989"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . inet_proto . inet_service . ipv4_addr
flags interval
elements = { 10.10.10.10 . sctp . 1234 . 10.10.10.0/24,
1.2.3.4 . tcp . 8080 . 1.6.0.0/16 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:990"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1000:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1000"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,port,net
Members:
1.2.3.4,tcp:8080,1.6.0.0/16
10.10.10.10,sctp:1234,10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1000"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1016:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1016"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr . ifname
flags interval
elements = { 10.10.10.0/24 . \"foobar0\",
20.20.20.0/24 . \"raboof0\" }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1016"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1026:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1026"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip saddr . oifname @foobar goto filter_IN_internal
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1026"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net,iface
Members:
10.10.10.0/24,foobar0
20.20.20.0/24,raboof0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1041:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1041"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1041"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1042:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1042"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1042"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1042:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1042"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1042"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1052" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY: invalid address/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1052"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_83
#AT_START_84
at_fn_group_banner 84 'firewall-cmd.at:1054' \
  "user helpers" "                                   " 4
at_xfail=no
(
  $as_echo "84. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1054"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1054"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1054"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1054"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1054"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1054"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1057:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1057"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:1057"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1058:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1058"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1058"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1059:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1059"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1059"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1060:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1060"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1060"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1061:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1061"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1061"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1062:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1062"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1062"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1064:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1064"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1064"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1066:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1066"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1066"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1068:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1068"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1071"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1072"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1074:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1074"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1074"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1075"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1076:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1076"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1076"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1078"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1079:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1079"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1079"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1080" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_MODULE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1080"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_84
#AT_START_85
at_fn_group_banner 85 'firewall-cmd.at:1082' \
  "direct" "                                         " 4
at_xfail=no
(
  $as_echo "85. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1082"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1082"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1082"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1082"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1082"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1082"






        $as_echo "firewall-cmd.at:1084" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1084"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1086"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1088"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1089"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1090:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1090"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1090"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1093:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1093"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1093"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1094"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1095"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1096:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1096"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1096"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1098:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1098"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1098"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1099"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1120"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1126"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1151"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1152"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1152"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1153" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1153"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_85
#AT_START_86
at_fn_group_banner 86 'firewall-cmd.at:1156' \
  "direct nat" "                                     " 4
at_xfail=no
(
  $as_echo "86. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1156"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1156"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1156"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1156"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1156"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1156"







        $as_echo "firewall-cmd.at:1159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1159"




        KERNEL_MAJOR=`uname -r | cut -d. -f1`
        KERNEL_MINOR=`uname -r | cut -d. -f2`
        if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 18 || test ${KERNEL_MAJOR} -gt 4; then
            :
        else
            $as_echo "firewall-cmd.at:1160" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1160"
        fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1167"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1169"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1171"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1172:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1172"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1172"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1176"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1179" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1179"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_86
#AT_START_87
at_fn_group_banner 87 'firewall-cmd.at:1181' \
  "direct passthrough" "                             " 4
at_xfail=no
(
  $as_echo "87. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1181"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1181"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1181"






        $as_echo "firewall-cmd.at:1183" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1183"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1185"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1186"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1188:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1188"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1188"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1189"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1191:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1191"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1191"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1192:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1192"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1192"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1193"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1194"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1204"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1209"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"\\-nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1217" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: NOT_ENABLED: passthrough/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1217"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_87
#AT_START_88
at_fn_group_banner 88 'firewall-cmd.at:1219' \
  "direct ebtables" "                                " 4
at_xfail=no
(
  $as_echo "88. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1219"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1219"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1219"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1219"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1219"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1219"






        $as_echo "firewall-cmd.at:1221" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1221"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1225"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1233"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1238"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1240"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1253"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1257"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1258"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1259"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1263" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1263"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_88
#AT_START_89
at_fn_group_banner 89 'firewall-cmd.at:1265' \
  "lockdown" "                                       " 4
at_xfail=no
(
  $as_echo "89. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1265"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1265"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1265"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1265"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1265"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1277"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1288"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1298"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1310"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1312"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:1314" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1314"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1317"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1319"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1320" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1320"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_89
#AT_START_90
at_fn_group_banner 90 'firewall-cmd.at:1332' \
  "rich rules good" "                                " 4
at_xfail=no
(
  $as_echo "90. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1332"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1332"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1332"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1332"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1332"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1332"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1360" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1360"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_90
#AT_START_91
at_fn_group_banner 91 'firewall-cmd.at:1361' \
  "rich rules audit" "                               " 4
at_xfail=no
(
  $as_echo "91. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1361"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1361"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1361"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1361"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1361"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1361"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:1364" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1364"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1364"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1366" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1366"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_91
#AT_START_92
at_fn_group_banner 92 'firewall-cmd.at:1369' \
  "rich rules priority" "                            " 4
at_xfail=no
(
  $as_echo "92. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1369"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1369"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1369"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1369"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1369"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1369"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1372"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1372"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:1372" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1372"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1372"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public {
jump filter_INPUT_POLICIES_pre
jump filter_IN_public_pre
jump filter_IN_public_log
jump filter_IN_public_deny
jump filter_IN_public_allow
jump filter_IN_public_post
jump filter_INPUT_POLICIES_post
meta l4proto { icmp, ipv6-icmp } accept
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1375"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public {
jump filter_FORWARD_POLICIES_pre
jump filter_FWD_public_pre
jump filter_FWD_public_log
jump filter_FWD_public_deny
jump filter_FWD_public_allow
jump filter_FWD_public_post
jump filter_FORWARD_POLICIES_post
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1390"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1456"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
tcp dport 1111 ct state new,untracked log
tcp dport 1122 ct state new,untracked log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1457"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
tcp dport 2222 ct state new,untracked drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1465"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1472:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1472"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 1122 ct state new,untracked accept
tcp dport 3333 ct state new,untracked accept
tcp dport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1472"
$at_failed && at_fn_log_failure
$at_traceon; }




























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1516"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1521:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1521"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1521"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1522"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1523:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1523"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1523"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1536"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1537"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1541"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1546"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1550"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1551"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1552"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1555"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1556"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1557:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1557"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1557"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=0 forward-port port=\"9090\" protocol=\"tcp\" to-port=\"90\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=0 forward-port port="9090" protocol="tcp" to-port="90"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"999\" protocol=\"tcp\" to-port=\"99\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="999" protocol="tcp" to-port="99"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"9999\" protocol=\"tcp\" to-port=\"9999\" to-addr=\"1234::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="9999" protocol="tcp" to-port="9999" to-addr="1234::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1563:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1563"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1563"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.1.0.0/16 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1575"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1590"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1596"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_pre {
meta nfproto ipv6 tcp dport 999 redirect to :99
meta nfproto ipv6 tcp dport 9999 dnat ip6 to [1234::4321]:9999
meta nfproto ipv4 tcp dport 8888 redirect to :80
meta nfproto ipv4 tcp dport 8080 dnat ip to 10.1.1.1:80
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_public_allow {
meta nfproto ipv4 tcp dport 222 redirect to :22
meta nfproto ipv4 tcp dport 2222 dnat ip to 10.1.1.1:22
meta nfproto ipv6 tcp dport 9090 redirect to :90
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1612"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_public_pre {
ip saddr 10.1.1.0/24 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1621"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1628:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1628"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_public_allow {
ip saddr 10.10.0.0/16 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1628"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1635"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1641"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1696"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1703"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
icmp type destination-unreachable reject with icmpx type admin-prohibited
icmpv6 type destination-unreachable reject with icmpx type admin-prohibited
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1704"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1714:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1714"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp type destination-unreachable reject with icmpx type admin-prohibited
icmpv6 type destination-unreachable reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1714"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1722:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1722"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1722"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1732"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1744:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1744"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1744"
$at_failed && at_fn_log_failure
$at_traceon; }














































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1808"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1811"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.0.0.0/8 log
tcp dport 1111 ct state new,untracked log
tcp dport 1111 ct state new,untracked drop
ip saddr 10.10.10.0/24 accept
ip saddr 10.0.0.0/8 log
ip saddr 10.0.0.0/8 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1812"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1824"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1832:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1832"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1832"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1838:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1838"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1838"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
tcp dport 80 ct state new,untracked accept
tcp dport 22 ct state new,untracked accept
tcp dport 443 ct state new,untracked accept
tcp dport 143 ct state new,untracked accept
log prefix \"DROPPED: \"
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1844"
$at_failed && at_fn_log_failure
$at_traceon; }







































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1899"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1900"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1900"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1905"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1935" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1935"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_92
#AT_START_93
at_fn_group_banner 93 'firewall-cmd.at:1940' \
  "rich rules bad" "                                 " 4
at_xfail=no
(
  $as_echo "93. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1940"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1940"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1940"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1940"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1940"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1940"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1971" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1971"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_93
#AT_START_94
at_fn_group_banner 94 'firewall-cmd.at:1976' \
  "config validation" "                              " 4
at_xfail=no
(
  $as_echo "94. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1976"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1976"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1976"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1976"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1976"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1976"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1980"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1985: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1985"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1985"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1986: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1986"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1986"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1987"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1992: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1992"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1992"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2001:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2001"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2001"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2009"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2010: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2010"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2010"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2019:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2019"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2019"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2027"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2035:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2035"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2035"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2036: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2036"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2036"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2039: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:2039"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2039"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2046:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2046"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2046"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2058:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2058"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2058"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2065:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2065"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:2065"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2066: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2066"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2066"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2069: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:2069"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2069"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2075"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2082"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2084:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2084"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2084"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2093: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2093"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2096: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:2096"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2096"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2103"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2111"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2112: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2112"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2112"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2115: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:2115"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2115"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2122"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2130"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2138"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2146"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2154"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2162"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2171"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2179"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2180: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2180"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2180"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2183: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:2183"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2183"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2187:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2187"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:2187"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:2195"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2203"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2211"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2219"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2227"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2235"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2243"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2251"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2259"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2267"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2275"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2290"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2303"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2318"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2333"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2335"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2351: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2351"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2351"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:2353" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:/d'              -e '/WARNING:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2353"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_94
#AT_START_95
at_fn_group_banner 95 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 5
at_xfail=no
(
  $as_echo "95. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_FORWARD_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }






















        if test x"" != x"ignore"; then
            $as_echo "rhbz1514043.at:84" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:84"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_95
#AT_START_96
at_fn_group_banner 96 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 5
at_xfail=no
(
  $as_echo "96. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"






        $as_echo "rhbz1498923.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1498923.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:6: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:18: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            $as_echo "rhbz1498923.at:47" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/.*a-bogus-flag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:47"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_96
#AT_START_97
at_fn_group_banner 97 'pr181.at:1' \
  "combined zones name length check" "               " 5
at_xfail=no
(
  $as_echo "97. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/pr181.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/pr181.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/pr181.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "pr181.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_97
#AT_START_98
at_fn_group_banner 98 'gh287.at:1' \
  "ICMP block inversion" "                           " 5
at_xfail=no
(
  $as_echo "98. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh287.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh287.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh287.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh287.at:15" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_98
#AT_START_99
at_fn_group_banner 99 'individual_calls.at:1' \
  "individual calls" "                               " 5
at_xfail=no
(
  $as_echo "99. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/individual_calls.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/individual_calls.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/individual_calls.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_99
#AT_START_100
at_fn_group_banner 100 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 5
at_xfail=no
(
  $as_echo "100. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_100
#AT_START_101
at_fn_group_banner 101 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 5
at_xfail=no
(
  $as_echo "101. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh290.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh290.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"






        $as_echo "gh290.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:3"



{ set +x
$as_echo "$at_srcdir/gh290.at:6: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:10: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:10"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:12: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:12"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:14" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:14"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:14" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:14"



    { set +x
$as_echo "$at_srcdir/gh290.at:15: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:.*mismatched tag.*/d'" != x"ignore"; then
            $as_echo "gh290.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:.*mismatched tag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_101
#AT_START_102
at_fn_group_banner 102 'gh290.at:19' \
  "invalid syntax in xml files" "                    " 5
at_xfail=no
(
  $as_echo "102. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:19: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:19: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh290.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh290.at:19: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh290.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:19" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:19"





{ set +x
$as_echo "$at_srcdir/gh290.at:23: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:23"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:24: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:25: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:26: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:26"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:28: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:28"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:29: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:29"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:30: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:30"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:32" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:32"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:32" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:32"



    { set +x
$as_echo "$at_srcdir/gh290.at:33: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:33"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:.*Missing attribute protocol for port.*/d'" != x"ignore"; then
            $as_echo "gh290.at:34" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:.*Missing attribute protocol for port.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:34"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_102
#AT_START_103
at_fn_group_banner 103 'icmp_block_in_forward_chain.at:1' \
  "ICMP block not present FORWARD chain" "           " 5
at_xfail=no
(
  $as_echo "103. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp type destination-unreachable icmp code host-prohibited reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "icmp_block_in_forward_chain.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_103
#AT_START_104
at_fn_group_banner 104 'pr323.at:1' \
  "GRE proto helper" "                               " 5
at_xfail=no
(
  $as_echo "104. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/pr323.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/pr323.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/pr323.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"" != x"ignore"; then
            $as_echo "pr323.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_104
#AT_START_105
at_fn_group_banner 105 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 5
at_xfail=no
(
  $as_echo "105. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"









    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"

                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"
                $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_105
#AT_START_106
at_fn_group_banner 106 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 5
at_xfail=no
(
  $as_echo "106. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"






        $as_echo "rhbz1594657.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1594657.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



        if test x"" != x"ignore"; then
            $as_echo "rhbz1594657.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_106
#AT_START_107
at_fn_group_banner 107 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 5
at_xfail=no
(
  $as_echo "107. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_107
#AT_START_108
at_fn_group_banner 108 'rhbz1404076.at:1' \
  "query single port added with range" "             " 5
at_xfail=no
(
  $as_echo "108. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"










    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1404076.at:76" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:76"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_108
#AT_START_109
at_fn_group_banner 109 'gh366.at:1' \
  "service destination multiple IP versions" "       " 5
at_xfail=no
(
  $as_echo "109. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh366.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh366.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh366.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "gh366.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_109
#AT_START_110
at_fn_group_banner 110 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 5
at_xfail=no
(
  $as_echo "110. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"

                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"
                $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '10.1.0.0/22' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.1.0.0/22, 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi



{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:89: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:89"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }








        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1601610.at:108" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:108"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_110
#AT_START_111
at_fn_group_banner 111 'gh303.at:1' \
  "unicode in XML" "                                 " 5
at_xfail=no
(
  $as_echo "111. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh303.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh303.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh303.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh303.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_111
#AT_START_112
at_fn_group_banner 112 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 5
at_xfail=no
(
  $as_echo "112. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh335.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh335.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr=\"1234:5678::4321\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr="1234:5678::4321"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"1234:5678::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="1234:5678::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "gh335.at:68" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_112
#AT_START_113
at_fn_group_banner 113 'gh482.at:1' \
  "remove forward-port after reload" "               " 5
at_xfail=no
(
  $as_echo "113. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh482.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh482.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh482.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh482.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_113
#AT_START_114
at_fn_group_banner 114 'gh478.at:1' \
  "rich rule marks every packet" "                   " 5
at_xfail=no
(
  $as_echo "114. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh478.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh478.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh478.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh478.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
tcp dport 1234 mark set 0x0000000a
meta l4proto icmp mark set 0x0000000b
tcp sport 4321 mark set 0x0000000c
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"" != x"ignore"; then
            $as_echo "gh478.at:28" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_114
#AT_START_115
at_fn_group_banner 115 'gh453.at:1' \
  "nftables helper objects" "                        " 5
at_xfail=no
(
  $as_echo "115. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh453.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh453.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ct_helper "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "gh453.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add ct helper inet firewalld helper-ftp-tcp { type \"ftp\" protocol tcp \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh453.at:1"

    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ct_helper "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-automatic-helpers=no "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-automatic-helpers=no
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-ftp-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-ftp-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-ftp-tcp {
type \"ftp\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-tcp {
type \"sip\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-udp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-udp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-udp {
type \"sip\" protocol udp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
tcp dport 5060 ct helper set \"helper-sip-tcp\"
udp dport 5060 ct helper set \"helper-sip-udp\"
tcp dport 5060 ct state new,untracked accept
udp dport 5060 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "gh453.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_115
#AT_START_116
at_fn_group_banner 116 'gh258.at:1' \
  "zone dispatch layout" "                           " 5
at_xfail=no
(
  $as_echo "116. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh258.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh258.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh258.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh258.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=\"dead:beef::/54\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source="dead:beef::/54"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip6 saddr dead:beef::/54 goto filter_IN_public
ip saddr 1.2.3.0/24 goto filter_IN_trusted
iifname \"dummy0\" goto filter_IN_trusted
iifname \"dummy1\" goto filter_IN_public
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable
jump filter_FORWARD_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_ZONES {
ip6 saddr dead:beef::/54 goto filter_FWD_public
ip saddr 1.2.3.0/24 goto filter_FWD_trusted
iifname \"dummy0\" goto filter_FWD_trusted
iifname \"dummy1\" goto filter_FWD_public
goto filter_FWD_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :






    { set +x
$as_echo "$at_srcdir/gh258.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
icmpv6 type { nd-router-advert, nd-neighbor-solicit } accept
meta nfproto ipv6 fib saddr . mark . iif oif missing drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    else
        :






    { set +x
$as_echo "$at_srcdir/gh258.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    fi






    { set +x
$as_echo "$at_srcdir/gh258.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING {
jump mangle_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto mangle_PRE_public
ip saddr 1.2.3.0/24 goto mangle_PRE_trusted
iifname \"dummy0\" goto mangle_PRE_trusted
iifname \"dummy1\" goto mangle_PRE_public
goto mangle_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto nat_PRE_public
ip saddr 1.2.3.0/24 goto nat_PRE_trusted
iifname \"dummy0\" goto nat_PRE_trusted
iifname \"dummy1\" goto nat_PRE_public
goto nat_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_ZONES {
ip6 daddr dead:beef::/54 goto nat_POST_public
ip daddr 1.2.3.0/24 goto nat_POST_trusted
oifname \"dummy0\" goto nat_POST_trusted
oifname \"dummy1\" goto nat_POST_public
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }



















































































        if test x"" != x"ignore"; then
            $as_echo "gh258.at:275" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:275"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_116
#AT_START_117
at_fn_group_banner 117 'rhbz1715977.at:1' \
  "rich rule src/dst with service destination" "     " 5
at_xfail=no
(
  $as_echo "117. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_internal_allow {
tcp dport 22 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
udp dport 137 ct helper set \"helper-netbios-ns-udp\"
udp dport 137 ct state new,untracked accept
udp dport 138 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 192.168.122.235 tcp dport 22 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.111.222/32\" source address=\"10.10.10.0/24\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.111.222/32" source address="10.10.10.0/24" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_internal_allow {
tcp dport 22 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
udp dport 137 ct helper set \"helper-netbios-ns-udp\"
udp dport 137 ct state new,untracked accept
udp dport 138 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 192.168.122.235 tcp dport 22 ct state new,untracked accept
ip daddr 192.168.111.222 ip saddr 10.10.10.0/24 tcp dport 22 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name=\"ssdp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name="ssdp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_internal_allow {
tcp dport 22 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
udp dport 137 ct helper set \"helper-netbios-ns-udp\"
udp dport 137 ct state new,untracked accept
udp dport 138 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 192.168.122.235 tcp dport 22 ct state new,untracked accept
ip daddr 192.168.111.222 ip saddr 10.10.10.0/24 tcp dport 22 ct state new,untracked accept
ip daddr 239.255.255.250 udp dport 1900 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "rhbz1715977.at:106" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:106"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_117
#AT_START_118
at_fn_group_banner 118 'rhbz1723610.at:1' \
  "direct remove-rules per family" "                 " 5
at_xfail=no
(
  $as_echo "118. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"






        $as_echo "rhbz1723610.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1723610.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1723610.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_118
#AT_START_119
at_fn_group_banner 119 'rhbz1734765.at:1' \
  "zone sources ordered by name" "                   " 5
at_xfail=no
(
  $as_echo "119. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"10.1.1.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="10.1.1.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"10.1.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="10.1.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"10.2.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="10.2.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"10.1.1.1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="10.1.1.1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"10.2.2.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="10.2.2.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"10.0.0.0/8\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="10.0.0.0/8"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"1234:5678::1:1:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="1234:5678::1:1:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"1234:5678::1:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="1234:5678::1:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"1234:5678::2:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="1234:5678::2:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"1234:5678::2:2:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="1234:5678::2:2:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"1234:5678::0:0:0/80\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="1234:5678::0:0:0/80"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"1234:5678::1:1:1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="1234:5678::1:1:1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld ipsetv4; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld ipsetv4; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set ipsetv4 {
type ipv4_addr
flags interval
elements = { 192.0.2.12 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld ipsetv6; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld ipsetv6; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set ipsetv6 {
type ipv6_addr
flags interval
elements = { ::2 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"10.10.10.10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="10.10.10.10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"20.20.20.20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="20.20.20.20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"1234:5678::10:10:10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="1234:5678::10:10:10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"1234:5678::20:20:20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="1234:5678::20:20:20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip saddr 10.1.1.1 goto filter_IN_foobar_00
ip6 saddr 1234:5678::1:1:1 goto filter_IN_foobar_00
ip saddr 10.1.1.0/24 goto filter_IN_foobar_01
ip6 saddr 1234:5678::1:1:0/112 goto filter_IN_foobar_01
ip saddr 10.10.10.10 goto filter_IN_foobar_010
ip6 saddr 1234:5678::10:10:10 goto filter_IN_foobar_010
ip saddr @ipsetv4 goto filter_IN_foobar_011
ip6 saddr @ipsetv6 goto filter_IN_foobar_012
ip saddr 10.1.0.0/16 goto filter_IN_foobar_02
ip6 saddr 1234:5678::1:0:0/96 goto filter_IN_foobar_02
ip saddr 10.2.2.0/24 goto filter_IN_foobar_03
ip6 saddr 1234:5678::2:2:0/112 goto filter_IN_foobar_03
ip saddr 10.2.0.0/16 goto filter_IN_foobar_04
ip6 saddr 1234:5678::2:0:0/96 goto filter_IN_foobar_04
ip saddr 10.0.0.0/8 goto filter_IN_foobar_05
ip6 saddr 1234:5678::/80 goto filter_IN_foobar_05
ip saddr 20.20.20.20 goto filter_IN_public
ip6 saddr 1234:5678::20:20:20 goto filter_IN_public
iifname \"foobar2\" goto filter_IN_foobar_010
iifname \"foobar1\" goto filter_IN_trusted
iifname \"foobar0\" goto filter_IN_internal
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_ZONES {
ip daddr 10.1.1.1 goto nat_POST_foobar_00
ip6 daddr 1234:5678::1:1:1 goto nat_POST_foobar_00
ip daddr 10.1.1.0/24 goto nat_POST_foobar_01
ip6 daddr 1234:5678::1:1:0/112 goto nat_POST_foobar_01
ip daddr 10.10.10.10 goto nat_POST_foobar_010
ip6 daddr 1234:5678::10:10:10 goto nat_POST_foobar_010
ip daddr @ipsetv4 goto nat_POST_foobar_011
ip6 daddr @ipsetv6 goto nat_POST_foobar_012
ip daddr 10.1.0.0/16 goto nat_POST_foobar_02
ip6 daddr 1234:5678::1:0:0/96 goto nat_POST_foobar_02
ip daddr 10.2.2.0/24 goto nat_POST_foobar_03
ip6 daddr 1234:5678::2:2:0/112 goto nat_POST_foobar_03
ip daddr 10.2.0.0/16 goto nat_POST_foobar_04
ip6 daddr 1234:5678::2:0:0/96 goto nat_POST_foobar_04
ip daddr 10.0.0.0/8 goto nat_POST_foobar_05
ip6 daddr 1234:5678::/80 goto nat_POST_foobar_05
ip daddr 20.20.20.20 goto nat_POST_public
ip6 daddr 1234:5678::20:20:20 goto nat_POST_public
oifname \"foobar2\" goto nat_POST_foobar_010
oifname \"foobar1\" goto nat_POST_trusted
oifname \"foobar0\" goto nat_POST_internal
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }






















        if test x"" != x"ignore"; then
            $as_echo "rhbz1734765.at:189" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:189"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_119
#AT_START_120
at_fn_group_banner 120 'gh509.at:1' \
  "missing firewalld.conf file" "                    " 5
at_xfail=no
(
  $as_echo "120. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh509.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh509.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh509.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh509.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh509.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh509.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh509.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/gh509.at:1"
    fi


{ set +x
$as_echo "$at_srcdir/gh509.at:1: if ! rm ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh509.at:1"
( $at_check_trace; if ! rm ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh509.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh509.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh509.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"





        if test x"-e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d'" != x"ignore"; then
            $as_echo "gh509.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to load/d'               -e '/WARNING:.*No such file or directory:.*/d'               -e '/WARNING: Using fallback firewalld configuration settings/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh509.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_120
#AT_START_121
at_fn_group_banner 121 'gh567.at:1' \
  "rich rule source w/ mark action" "                " 5
at_xfail=no
(
  $as_echo "121. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh567.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh567.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh567.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh567.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh567.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh567.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh567.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:1"








    { set +x
$as_echo "$at_srcdir/gh567.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh567.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
        $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"

                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"
                $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"


    { set +x
$as_echo "$at_srcdir/gh567.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh567.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule \"rule family=ipv4 source ipset=Teste mark set=2\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule "rule family=ipv4 source ipset=Teste mark set=2"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh567.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_121
#AT_START_122
at_fn_group_banner 122 'rhbz1779835.at:1' \
  "ipv6 address with brackets" "                     " 5
at_xfail=no
(
  $as_echo "122. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
        $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"

                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"
                $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:14" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:14"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_122
#AT_START_123
at_fn_group_banner 123 'rhbz1779835.at:16' \
  "ipv6 address with brackets" "                     " 5
at_xfail=no
(
  $as_echo "123. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"













    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234] "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234]
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_123
#AT_START_124
at_fn_group_banner 124 'gh330.at:1' \
  "ipset cleanup on reload/stop" "                   " 5
at_xfail=no
(
  $as_echo "124. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh330.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh330.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh330.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh330.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh330.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh330.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:1"





{ set +x
$as_echo "$at_srcdir/gh330.at:4: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:4"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh330.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh330.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







{ set +x
$as_echo "$at_srcdir/gh330.at:30: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:30"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh330.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
4.3.2.1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 4.3.2.1,
10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh330.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
4.3.2.1
6.6.6.6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4, 4.3.2.1,
6.6.6.6, 10.10.10.10 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh330.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/gh330.at:120: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:120"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }






    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:123" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:123"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:123" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:123"





    { set +x
$as_echo "$at_srcdir/gh330.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }



        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi







    { set +x
$as_echo "$at_srcdir/gh330.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:142" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:142"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:142" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:142"




        if test x"" != x"ignore"; then
            $as_echo "gh330.at:144" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:144"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_124
#AT_START_125
at_fn_group_banner 125 'gh599.at:1' \
  "writing to log after copytruncate" "              " 5
at_xfail=no
(
  $as_echo "125. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh599.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh599.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh599.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh599.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh599.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh599.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh599.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:1"





$as_echo "gh599.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which truncate >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:4"
$as_echo "gh599.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which wc >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:5"
$as_echo "gh599.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which expr >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:6"


    { set +x
$as_echo "$at_srcdir/gh599.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} truncate -s 0 ./firewalld.log "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} truncate -s 0 ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/gh599.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} expr \$(cat ./firewalld.log | wc -c) \">\" 0 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh599.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} expr $(cat ./firewalld.log | wc -c) ">" 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"-e '/ERROR: INVALID_SERVICE: this_does_not_exist/d'" != x"ignore"; then
            $as_echo "gh599.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE: this_does_not_exist/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_125
#AT_START_126
at_fn_group_banner 126 'rhbz1843398.at:1' \
  "rich rule source mac" "                           " 5
at_xfail=no
(
  $as_echo "126. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1843398.at:8" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:8"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_126
#AT_START_127
at_fn_group_banner 127 'rhbz1839781.at:1' \
  "service RH-Satellite-6" "                         " 5
at_xfail=no
(
  $as_echo "127. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_trusted_allow {
tcp dport 53 ct state new,untracked accept
udp dport 53 ct state new,untracked accept
tcp dport 80 ct state new,untracked accept
tcp dport 443 ct state new,untracked accept
udp dport 67 ct state new,untracked accept
udp dport 69 ct helper set \"helper-tftp-udp\"
udp dport 69 ct state new,untracked accept
udp dport 68 ct state new,untracked accept
tcp dport 8140 ct state new,untracked accept
tcp dport 5000 ct state new,untracked accept
tcp dport 5646-5647 ct state new,untracked accept
tcp dport 5671 ct state new,untracked accept
tcp dport 8000 ct state new,untracked accept
tcp dport 8080 ct state new,untracked accept
tcp dport 9090 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_trusted_allow {
tcp dport 53 ct state new,untracked accept
udp dport 53 ct state new,untracked accept
tcp dport 80 ct state new,untracked accept
tcp dport 443 ct state new,untracked accept
udp dport 67 ct state new,untracked accept
udp dport 69 ct helper set \"helper-tftp-udp\"
udp dport 69 ct state new,untracked accept
udp dport 68 ct state new,untracked accept
tcp dport 8140 ct state new,untracked accept
tcp dport 5000 ct state new,untracked accept
tcp dport 5646-5647 ct state new,untracked accept
tcp dport 5671 ct state new,untracked accept
tcp dport 8000 ct state new,untracked accept
tcp dport 8080 ct state new,untracked accept
tcp dport 9090 ct state new,untracked accept
tcp dport 8443 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x"" != x"ignore"; then
            $as_echo "rhbz1839781.at:123" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:123"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_127
#AT_START_128
at_fn_group_banner 128 'rhbz1689429.at:1' \
  "rich rule invalid priority" "                     " 5
at_xfail=no
(
  $as_echo "128. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            $as_echo "rhbz1689429.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_128
#AT_START_129
at_fn_group_banner 129 'rhbz1483921.at:1' \
  "direct and zone mutually exclusive" "             " 5
at_xfail=no
(
  $as_echo "129. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"






        $as_echo "rhbz1483921.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1483921.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1483921.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_129
#AT_START_130
at_fn_group_banner 130 'rhbz1541077.at:1' \
  "hash:mac and family mutually exclusive" "         " 5
at_xfail=no
(
  $as_echo "130. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6" "rhbz1541077.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1541077.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_130
#AT_START_131
at_fn_group_banner 131 'rhbz1855140.at:1' \
  "rich rule icmptypes with one family" "            " 5
at_xfail=no
(
  $as_echo "131. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"timestamp-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="timestamp-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
icmpv6 type parameter-problem icmpv6 code no-route mark set mark & 0x00000086 ^ 0x00000086
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
icmp type echo-request accept
icmpv6 type echo-request accept
icmpv6 type nd-neighbor-advert accept
icmp type timestamp-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "rhbz1855140.at:53" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:53"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_131
#AT_START_132
at_fn_group_banner 132 'rhbz1871298.at:1' \
  "rich rule parsing bottleneck" "                   " 5
at_xfail=no
(
  $as_echo "132. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"





$as_echo "rhbz1871298.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which timeout >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1871298.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} mkdir -p ./zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<short>foobar</short>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<short>foobar</short>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sh -c 'for I in \$(seq 10000); do echo \"<rule family=\\\"ipv4\\\"><port protocol=\\\"tcp\\\" port=\\\"\$I\\\" /><accept/></rule>\" >> ./zones/foobar.xml; done' "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1871298.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c 'for I in $(seq 10000); do echo "<rule family=\"ipv4\"><port protocol=\"tcp\" port=\"$I\" /><accept/></rule>" >> ./zones/foobar.xml; done'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"</zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "</zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
    FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
fi

    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} timeout 45 firewall-offline-cmd --system-config ./ \$FIREWALL_OFFLINE_CMD_ARGS --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} timeout 45 firewall-offline-cmd --system-config ./ $FIREWALL_OFFLINE_CMD_ARGS --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1871298.at:18" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_132
#AT_START_133
at_fn_group_banner 133 'rhbz1596304.at:1' \
  "rich rules strip non-printable characters" "      " 5
at_xfail=no
(
  $as_echo "133. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family=\"ipv4\" source address=\"104.243.250.0/22	\" port port=80 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family="ipv4" source address="104.243.250.0/22	" port port=80 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1596304.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv4\" source address=\"104.243.250.0/22\" port port=\"80\" protocol=\"tcp\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "rhbz1596304.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_133
#AT_START_134
at_fn_group_banner 134 'gh703.at:1' \
  "add source with mac address" "                    " 5
at_xfail=no
(
  $as_echo "134. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh703.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh703.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh703.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh703.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh703.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh703.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh703.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:1"








    { set +x
$as_echo "$at_srcdir/gh703.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh703.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh703.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_ZONES {
ether daddr 34:7e:5c:3a:4c:32 goto nat_POST_home
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            $as_echo "gh703.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_134
#AT_START_135
at_fn_group_banner 135 'ipset_netmask_allowed.at:1' \
  "ipset netmask allowed type hash:ip" "             " 5
at_xfail=no
(
  $as_echo "135. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_ENTRY:/d'" != x"ignore"; then
            $as_echo "ipset_netmask_allowed.at:25" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:25"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_135
#AT_START_136
at_fn_group_banner 136 'rhbz1940928.at:1' \
  "direct -s/-d multiple addresses" "                " 5
at_xfail=no
(
  $as_echo "136. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"






        $as_echo "rhbz1940928.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1940928.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1940928.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT tcp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT tcp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT tcp -- 0.0.0.0/0 192.168.0.0/24
ACCEPT udp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT udp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT udp -- 0.0.0.0/0 192.168.0.0/24
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT sctp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT sctp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT sctp -- 0.0.0.0/0 192.168.0.0/24
ACCEPT tcp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT tcp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT tcp -- 0.0.0.0/0 192.168.0.0/24
ACCEPT udp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT udp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT udp -- 0.0.0.0/0 192.168.0.0/24
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1940928.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_136
#AT_START_137
at_fn_group_banner 137 'rhbz1936896.at:1' \
  "ipset type hash:net,net" "                        " 5
at_xfail=no
(
  $as_echo "137. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout { type ipv4_addr \; timeout 600s \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_size { type ipv4_addr \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
        $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_timeout_size { type ipv4_addr \; timeout 600s \; size 100000 \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"

                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft add set inet firewalld_check_ipset foobar_interval_concat { type ipv4_addr . inet_service \; flags interval \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"
                $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -j '{"nftables": [{"add": {"element": {"family": "inet", "table": "firewalld_check_ipset", "name": "foobar_interval_concat", "elem": [{"concat": [{"prefix": {"addr": "10.10.10.0", "len": 24}}, {"range": ["1234", "2000"]}]}]}}}]}' >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"


    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "testset
type: hash:net,net
options:
entries: 192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list testset; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list testset; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: testset
Type: hash:net,net
Members:
192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld testset; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld testset; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set testset {
type ipv4_addr . ipv4_addr
flags interval
elements = { 192.168.0.0/24 . 10.0.1.0/24 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "rhbz1936896.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_137
#AT_START_138
at_fn_group_banner 138 'gh795.at:1' \
  "ipset entry delete w/ timeout=0" "                " 5
at_xfail=no
(
  $as_echo "138. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh795.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh795.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/gh795.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/gh795.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/gh795.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh795.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh795.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:1"








    { set +x
$as_echo "$at_srcdir/gh795.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '1.2.3.4' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh795.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh795.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 1.2.3.4 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh795.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh795.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4 timeout 0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/gh795.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "gh795.at:48" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_138
#AT_START_139
at_fn_group_banner 139 'rhbz1914935.at:1' \
  "zone overlapping ports" "                         " 5
at_xfail=no
(
  $as_echo "139. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1914935.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "rhbz1914935.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-65535" protocol="tcp" />
<port port="1234" protocol="tcp" />
<port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:15: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:15"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:16: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:16"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-65535" protocol="tcp" />
<source-port port="1234" protocol="tcp" />
<source-port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:30: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:30"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:31: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:31"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-2000" protocol="tcp" />
<port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:45: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:45"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-2000" protocol="tcp" />
<source-port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:59: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:59"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1914935.at:64" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:64"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_139
#AT_START_140
at_fn_group_banner 140 'python.at:3' \
  "firewalld_test.py" "                              " 6
at_xfail=no
(
  $as_echo "140. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:3:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:6" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_140
#AT_START_141
at_fn_group_banner 141 'python.at:8' \
  "firewalld_config.py" "                            " 6
at_xfail=no
(
  $as_echo "141. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:11" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_141
#AT_START_142
at_fn_group_banner 142 'python.at:13' \
  "firewalld_rich.py" "                              " 6
at_xfail=no
(
  $as_echo "142. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_142
#AT_START_143
at_fn_group_banner 143 'python.at:18' \
  "firewalld_direct.py" "                            " 6
at_xfail=no
(
  $as_echo "143. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/python.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/python.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/python.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"






        $as_echo "python.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:20"



    { set +x
$as_echo "$at_srcdir/python.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_143
#AT_START_144
at_fn_group_banner 144 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 7
at_xfail=no
(
  $as_echo "144. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_FORWARD_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
ct state established,related accept
oifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_OUTPUT_POLICIES_pre
jump filter_OUTPUT_POLICIES_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }
















{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:74: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:74"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_FORWARD_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
ct state established,related accept
oifname \"lo\" accept
jump filter_OUTPUT_POLICIES_pre
jump filter_OUTPUT_POLICIES_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }



















        if test x"" != x"ignore"; then
            $as_echo "rfc3964_ipv4.at:121" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:121"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_144
#AT_START_145
at_fn_group_banner 145 'service_include.at:1' \
  "service include" "                                " 7
at_xfail=no
(
  $as_echo "145. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/service_include.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/service_include.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/service_include.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/service_include.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_drop_allow {
ip daddr 239.255.255.250 udp dport 1900 ct state new,untracked accept
ip6 daddr ff02::c udp dport 1900 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
tcp dport 12345 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/service_include.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:96: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:96"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:99: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:99"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dhcpv6-client ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_SERVICE: does-not-exist/d'" != x"ignore"; then
            $as_echo "service_include.at:126" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE: does-not-exist/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:126"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_145
#AT_START_146
at_fn_group_banner 146 'helpers_custom.at:1' \
  "customer helpers" "                               " 7
at_xfail=no
(
  $as_echo "146. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/helpers_custom.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-service=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/helpers_custom.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/helpers_custom.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/helpers_custom.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/helpers_custom.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/helpers_custom.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"21/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="21/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/helpers_custom.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 2121 ct helper set \"helper-ftptest-tcp\"
tcp dport 2121 ct state new,untracked accept
tcp dport 21 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





















        if test x"" != x"ignore"; then
            $as_echo "helpers_custom.at:156" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:156"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_146
#AT_START_147
at_fn_group_banner 147 'policy.at:5' \
  "policy - xml" "                                   " 7
at_xfail=no
(
  $as_echo "147. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:5: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5"





{ set +x
$as_echo "$at_srcdir/policy.at:8: mkdir -p ./policies"
at_fn_check_prepare_trace "policy.at:8"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./policies/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-123">
<short>foobar</short>
<description>foobar policy</description>
<ingress-zone name="public" />
<egress-zone name="ANY" />
<service name="ssh" />
<service name="https" />
<port port="1234" protocol="tcp" />
<icmp-block name="echo-request" />
<masquerade />
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
<source-port port="1234" protocol="udp" />
<protocol value="ipv6-icmp" />
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <destination address="192.168.10.0/24" />
    <service name="ssh" />
    <accept>
        <limit value="5/m" />
    </accept>
</rule>
<rule>
    <port port="1234" protocol="tcp" />
    <reject />
</rule>
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <icmp-block name="echo-request" />
</rule>
<rule>
    <icmp-type name="echo-reply" />
    <drop />
</rule>
<rule family="ipv4">
    <forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
</rule>
<rule>
    <source-port port="1234" protocol="udp" />
    <log prefix="LOG: " level="warning" />
</rule>
<rule family="ipv6">
    <protocol value="ipv6-icmp" />
    <audit />
    <accept />
</rule>
<rule family="ipv4">
    <destination address="192.168.10.0/24" />
    <mark set="123" />
</rule>
</policy>
_ATEOF




    { set +x
$as_echo "$at_srcdir/policy.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "policy.at:67" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:67"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_147
#AT_START_148
at_fn_group_banner 148 'policy.at:73' \
  "policy - create" "                                " 7
at_xfail=no
(
  $as_echo "148. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:73: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:73: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:73"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:73: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:73"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:73: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:73" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:73"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:73: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:73"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:73" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:73"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:73" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:73"








    { set +x
$as_echo "$at_srcdir/policy.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:88" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:88"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_148
#AT_START_149
at_fn_group_banner 149 'policy.at:90' \
  "policy - name" "                                  " 7
at_xfail=no
(
  $as_echo "149. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:90: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:90: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:90"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:90: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:90"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:90: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:90" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:90"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:90: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:90"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:90" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:90"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:90" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:90"








    { set +x
$as_echo "$at_srcdir/policy.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/policy.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d'" != x"ignore"; then
            $as_echo "policy.at:101" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:101"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_149
#AT_START_150
at_fn_group_banner 150 'policy.at:103' \
  "policy - list" "                                  " 7
at_xfail=no
(
  $as_echo "150. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:103: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:103: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:103"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:103: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:103"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:103: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:103" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:103"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:103: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:103"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:103" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:103"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:103" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:103"








    { set +x
$as_echo "$at_srcdir/policy.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:184:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:184"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:184"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:223" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:223"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_150
#AT_START_151
at_fn_group_banner 151 'policy.at:225' \
  "policy - options" "                               " 7
at_xfail=no
(
  $as_echo "151. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:225: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:225: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:225"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:225: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:225"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:225: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:225" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:225"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:225: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:225"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:225" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:225"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:225" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:225"








    { set +x
$as_echo "$at_srcdir/policy.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-priority 5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-priority 5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-priority 5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-priority 5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:282" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:282"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_151
#AT_START_152
at_fn_group_banner 152 'policy.at:284' \
  "policy - priority" "                              " 7
at_xfail=no
(
  $as_echo "152. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:284: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:284: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:284"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:284: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:284"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:284: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:284" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:284"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:284: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:284"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:284" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:284"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:284" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:284"








    { set +x
$as_echo "$at_srcdir/policy.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_worldToHost
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_post {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/policy.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_post {
jump filter_IN_policy_worldToHost
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/policy.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy first "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy first
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy second "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy second
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy third "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy third
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fourth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fourth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fifth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fifth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_first
jump filter_IN_policy_second
jump filter_IN_policy_third
jump filter_IN_policy_fourth
jump filter_IN_policy_fifth
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/policy.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PRIORITY/d'" != x"ignore"; then
            $as_echo "policy.at:412" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PRIORITY/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:412"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_152
#AT_START_153
at_fn_group_banner 153 'policy.at:414' \
  "policy - zones" "                                 " 7
at_xfail=no
(
  $as_echo "153. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:414: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:414: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:414"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:414: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:414"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:414: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:414" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:414"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:414: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:414"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:414" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:414"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:414" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:414"








    { set +x
$as_echo "$at_srcdir/policy.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:430:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:430"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:430"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:458:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:458"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:472:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:472"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:472"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:473:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:473"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:475:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:475"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:475"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:485:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:485"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:503"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:507:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:507"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:519"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:520"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:521:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:521"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:521"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:522"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:534"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:535"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:548"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: internal
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:581:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:581"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:583:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:583"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:588:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:588"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "policy.at:599" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:599"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_153
#AT_START_154
at_fn_group_banner 154 'policy.at:601' \
  "policy - dispatch" "                              " 7
at_xfail=no
(
  $as_echo "154. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:601: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:601: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:601"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:601: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:601"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:601: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:601" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:601"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:601: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:601"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:601" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:601"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:601" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:601"








    { set +x
$as_echo "$at_srcdir/policy.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:607:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:607"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:607"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:608"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:611"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:630:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:630"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
iifname \"foobar0\" jump filter_IN_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:647:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:647"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:647"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:658:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:658"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:678:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:678"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:678"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:692"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:717"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:722:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:722"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:722"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
jump filter_IN_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:741:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:741"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:789"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:806"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:838:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:838"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
oifname \"foobar0\" jump filter_OUT_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:838"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:852:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:852"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:852"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:913:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:913"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:913"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:914"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:916:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:916"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:916"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:930:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:930"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
jump filter_OUT_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:930"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:944:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:944"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:944"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:962:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:962"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:962"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:976:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:976"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:976"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:990"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1000:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1000"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1000"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1001:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1001"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1001"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1005"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1006:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1006"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1006"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1022:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1022"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1022"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1033:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1033"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1033"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1056:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1056"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1056"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1090:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1090"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
jump nat_POST_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1090"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1104"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1109"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1111"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
oifname \"foobar0\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1159"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1187:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1187"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
oifname \"foobar0\" jump nat_POST_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1187"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1202"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1203"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1208:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1208"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1208"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1209"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1211"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1225"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1236"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1257"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1273"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
ip daddr 10.10.10.0/24 jump nat_POST_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1289"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1303"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1311"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1325"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar1\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1376"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1393:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1393"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1393"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1405"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1410"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1411"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1413"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1427"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
ip saddr 10.10.10.0/24 jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1438"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1459"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1475:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1475"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1475"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
ip saddr 10.10.10.0/24 jump nat_POST_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1491"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1503"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1505"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1515"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1529"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar1\" oifname \"foobar0\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1540"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1563:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1563"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1563"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1577"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1604"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1612"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1614"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1628:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1628"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1628"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1639:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1639"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1639"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1660:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1660"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1660"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar1\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1676"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1703"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1704"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1705"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1710"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1712:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1712"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1712"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1713:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1713"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1713"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1715:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1715"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1715"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1729"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1740:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1740"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
ip saddr 10.10.10.0/24 oifname \"foobar0\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1740"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1761"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1775:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1775"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1775"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
ip saddr 10.10.10.0/24 oifname \"foobar0\" jump nat_POST_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1789"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1812"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_POLICIES_pre {
jump filter_IN_policy_allow-host-ipv6
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1814"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1828"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1839"
$at_failed && at_fn_log_failure
$at_traceon; }























    { set +x
$as_echo "$at_srcdir/policy.at:1860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_POLICIES_pre {
jump mangle_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump mangle_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1860"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1876"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/policy.at:1892:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1892"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POSTROUTING_POLICIES_pre {
ip saddr 10.10.10.0/24 ip daddr 10.20.20.0/24 jump nat_POST_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1892"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:1904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1906"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1907"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:1909" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:1909"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_154
#AT_START_155
at_fn_group_banner 155 'policy.at:1911' \
  "policy - interfaces/sources" "                    " 7
at_xfail=no
(
  $as_echo "155. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:1911: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:1911: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:1911"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:1911: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:1911"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:1911: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:1911" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:1911"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:1911:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:1911: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:1911"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:1911:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:1911:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:1911" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:1911"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:1911" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:1911"








    { set +x
$as_echo "$at_srcdir/policy.at:1914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1915:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1915"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1915"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1916:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1916"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1916"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1917:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1917"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1917"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1918"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1918"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:1919:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1919"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1919"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:1933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1933"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1934"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar0\" oifname { \"foobar1\", \"foobar2\" } jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:1971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1972:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1972"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
iifname \"foobar0\" oifname \"foobar1\" jump filter_FWD_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1972"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:1990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1990"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:1991:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1991"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1991"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:2005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2005"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:2006:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2006"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2006"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/policy.at:2024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2024"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:2027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2027"
$at_failed && at_fn_log_failure
$at_traceon; }







{ set +x
$as_echo "$at_srcdir/policy.at:2028: grep 'iifname \"foobar0\" ip6 daddr 1234::/64 jump nat_PRE_policy_foobar' ./stdout"
at_fn_check_prepare_trace "policy.at:2028"
( $at_check_trace; grep 'iifname "foobar0" ip6 daddr 1234::/64 jump nat_PRE_policy_foobar' ./stdout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2028"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/policy.at:2042:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2042"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2042"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:2045:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2045"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PREROUTING_POLICIES_pre {
jump nat_PRE_policy_allow-host-ipv6
iifname \"foobar0\" ip daddr 10.10.10.0/24 jump nat_PRE_policy_foobar
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2045"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:2064:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2064"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2064"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:2065:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2065"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_POLICIES_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2065"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"" != x"ignore"; then
            $as_echo "policy.at:2076" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2076"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_155
#AT_START_156
at_fn_group_banner 156 'policy.at:2078' \
  "policy - target" "                                " 7
at_xfail=no
(
  $as_echo "156. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:2078: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:2078: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:2078"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:2078: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:2078"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:2078: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:2078" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2078"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:2078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:2078: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:2078"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:2078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:2078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:2078" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2078"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:2078" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2078"








    { set +x
$as_echo "$at_srcdir/policy.at:2081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2081"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2083:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2083"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2083"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2084:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2084"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2084"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2085"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2086"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:2087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:2088"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2091"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2092:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2092"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2092"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2093:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2093"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2094"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2095"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2095"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/policy.at:2096:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2096"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar {
jump filter_IN_policy_foobar_pre
jump filter_IN_policy_foobar_log
jump filter_IN_policy_foobar_deny
jump filter_IN_policy_foobar_allow
jump filter_IN_policy_foobar_post
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2096"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"ignore" != x"ignore"; then
            $as_echo "policy.at:2125" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2125"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_156
#AT_START_157
at_fn_group_banner 157 'policy.at:2127' \
  "policy - from file" "                             " 7
at_xfail=no
(
  $as_echo "157. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:2127: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:2127: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:2127"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:2127: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:2127"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:2127: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:2127" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2127"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/policy.at:2127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/policy.at:2127: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:2127"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/policy.at:2127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/policy.at:2127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:2127" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2127"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:2127" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2127"








    { set +x
$as_echo "$at_srcdir/policy.at:2130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2130"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:2131: ls \"./policies/allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:2131"
( $at_check_trace; ls "./policies/allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2131"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:2132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy-from-file "./policies/allow-host-ipv6.xml" --name my-allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2132"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:2133: ls \"./policies/my-allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:2133"
( $at_check_trace; ls "./policies/my-allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2133"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:2134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2134"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2137"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2138"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:2142" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2142"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_157
#AT_START_158
at_fn_group_banner 158 'services.at:1' \
  "services" "                                       " 7
at_xfail=no
(
  $as_echo "158. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/services.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/services.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/services.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/services.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/services.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/services.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "services.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/services.at:1"








    { set +x
$as_echo "$at_srcdir/services.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp dport 22 ct state new,untracked accept
ip saddr 10.10.10.0/24 tcp dport 22 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/services.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
ip saddr 10.10.10.0/24 tcp dport 21 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }





















    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_SERVICE/d'" != x"ignore"; then
            $as_echo "services.at:97" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/services.at:97"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_158
#AT_START_159
at_fn_group_banner 159 'ports.at:1' \
  "ports" "                                          " 7
at_xfail=no
(
  $as_echo "159. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/ports.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:1"








    { set +x
$as_echo "$at_srcdir/ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp dport 1234 ct state new,untracked accept
udp dport 1234 ct state new,untracked accept
udp dport 4321 ct state new,untracked accept
udp dport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
udp dport 1234 ct state new,untracked accept
sctp dport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_159
#AT_START_160
at_fn_group_banner 160 'source_ports.at:1' \
  "source ports" "                                   " 7
at_xfail=no
(
  $as_echo "160. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/source_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/source_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/source_ports.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/source_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/source_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "source_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"








    { set +x
$as_echo "$at_srcdir/source_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
tcp sport 1234 ct state new,untracked accept
udp sport 1234 ct state new,untracked accept
udp sport 4321 ct state new,untracked accept
udp sport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/source_ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
udp sport 1234 ct state new,untracked accept
sctp sport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "source_ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_160
#AT_START_161
at_fn_group_banner 161 'forward_ports.at:1' \
  "forward ports" "                                  " 7
at_xfail=no
(
  $as_echo "161. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/forward_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/forward_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/forward_ports.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/forward_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/forward_ports.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "forward_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"








    { set +x
$as_echo "$at_srcdir/forward_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 33 dnat ip to 10.10.10.10:33
meta nfproto ipv6 udp dport 44 dnat ip6 to [1234::4321]:4444
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/forward_ports.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/forward_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 33 dnat ip to 10.10.10.10:33
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 22 redirect to :2222
meta nfproto ipv6 udp dport 444 redirect to :4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/forward_ports.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:179"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_PRE_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_PRE_policy_foobar_allow {
meta nfproto ipv4 tcp dport 22 dnat ip to 10.0.0.1:2222
meta nfproto ipv4 udp dport 444 dnat ip to 10.44.44.44:4444
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d'" != x"ignore"; then
            $as_echo "forward_ports.at:196" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:196"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_161
#AT_START_162
at_fn_group_banner 162 'masquerade.at:1' \
  "masquerade" "                                     " 7
at_xfail=no
(
  $as_echo "162. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/masquerade.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/masquerade.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/masquerade.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/masquerade.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/masquerade.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "masquerade.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"








    { set +x
$as_echo "$at_srcdir/masquerade.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_policy_foobar_allow {
meta nfproto ipv4 oifname != \"lo\" masquerade
ip saddr 10.10.10.0/24 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/masquerade.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld nat_POST_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain nat_POST_policy_foobar_allow {
meta nfproto ipv4 oifname != \"lo\" masquerade
ip6 saddr 1234::/64 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "masquerade.at:103" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:103"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_162
#AT_START_163
at_fn_group_banner 163 'protocols.at:1' \
  "protocols" "                                      " 7
at_xfail=no
(
  $as_echo "163. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/protocols.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/protocols.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/protocols.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/protocols.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/protocols.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/protocols.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "protocols.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:1"








    { set +x
$as_echo "$at_srcdir/protocols.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
meta l4proto sctp ct state new,untracked accept
meta l4proto ipv6-icmp ct state new,untracked accept
meta l4proto dccp ct state new,untracked accept
meta l4proto gre ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/protocols.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
meta l4proto ipv6-icmp ct state new,untracked accept
meta l4proto sctp ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "protocols.at:98" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:98"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_163
#AT_START_164
at_fn_group_banner 164 'rich_rules.at:1' \
  "rich rules" "                                     " 7
at_xfail=no
(
  $as_echo "164. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_rules.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rich_rules.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rich_rules.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rich_rules.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rich_rules.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_rules.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"








    { set +x
$as_echo "$at_srcdir/rich_rules.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rich_rules.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar {
jump filter_IN_policy_foobar_pre
jump filter_IN_policy_foobar_log
jump filter_IN_policy_foobar_deny
jump filter_IN_policy_foobar_allow
jump filter_IN_policy_foobar_post
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rich_rules.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_pre {
ip saddr 10.10.10.14 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_log {
ip saddr 10.10.10.11 log
ip saddr 10.10.10.11 log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_deny {
ip saddr 10.10.10.12 reject
ip saddr 10.10.10.13 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
ip saddr 10.10.10.10 accept
ip saddr 10.10.10.11 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_post {
ip saddr 10.10.10.15 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_pre {
ip6 daddr 1234::4444 ip6 saddr 1234::4321 drop
ip daddr 10.20.20.23 ip saddr 10.20.20.22 drop
ip daddr 10.20.20.21 accept
ip saddr 10.10.10.14 accept
ip saddr 10.20.20.20 accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rich_rules.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_pre {
ip6 daddr 1234::4444 ip6 saddr 1234::4321 drop
ip daddr 10.20.20.23 ip saddr 10.20.20.22 drop
ip daddr 10.20.20.21 accept
icmp type echo-request accept
icmpv6 type echo-request accept
ip saddr 10.10.10.14 accept
ip saddr 10.20.20.20 accept
icmpv6 type nd-neighbor-advert accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rich_rules.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_policy_foobar_pre {
mark set mark & 0x0000ff00 ^ 0x00006600
mark set 0x000004d2
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_policy_foobar_pre {
mark set mark & 0x0000ff00 ^ 0x00006600
mark set 0x000004d2
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:200"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld mangle_PRE_policy_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_policy_foobar_pre {
mark set mark & 0x0000ff00 ^ 0x00006600
mark set 0x000004d2
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/rich_rules.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_post {
ip saddr 10.10.10.15 accept
log prefix \"LOG: \"
log level audit
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "rich_rules.at:292" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:292"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_164
#AT_START_165
at_fn_group_banner 165 'icmp_blocks.at:1' \
  "ICMP blocks" "                                    " 7
at_xfail=no
(
  $as_echo "165. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_deny {
icmp type echo-request reject with icmpx type admin-prohibited
icmpv6 type echo-request reject with icmpx type admin-prohibited
icmp type echo-reply reject with icmpx type admin-prohibited
icmpv6 type echo-reply reject with icmpx type admin-prohibited
icmp type redirect reject with icmpx type admin-prohibited
icmpv6 type nd-redirect reject with icmpx type admin-prohibited
ip6 saddr 1234:5678::/64 icmpv6 type nd-redirect reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }





















    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_foobar_deny {
icmp type echo-request reject with icmpx type admin-prohibited
icmpv6 type echo-request reject with icmpx type admin-prohibited
ip6 saddr 1234:5678::/64 icmpv6 type nd-redirect reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





















    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "icmp_blocks.at:148" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:148"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_165
#AT_START_166
at_fn_group_banner 166 'rich_tcp_mss_clamp.at:5' \
  "tcp-mss-clamp" "                                  " 7
at_xfail=no
(
  $as_echo "166. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:8: mkdir -p ./zones"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:8"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="536"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="pmtu"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="thisdoesnotexist"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44: grep \"WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
\" ./firewalld.log"
at_fn_check_prepare_notrace 'an embedded newline' "rich_tcp_mss_clamp.at:44"
( $at_check_trace; grep "WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value="thisdoesnotexist"
" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:65: rm ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:65"
( $at_check_trace; rm ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_tcp_mss_clamp.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_public_allow {
tcp flags syn tcp option maxseg size set 536
tcp flags syn tcp option maxseg size set rt mtu
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }

















        if test x"ignore" != x"ignore"; then
            $as_echo "rich_tcp_mss_clamp.at:102" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:102"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_166
#AT_START_167
at_fn_group_banner 167 'rich_destination_ipset.at:1' \
  "rich destination ipset" "                         " 7
at_xfail=no
(
  $as_echo "167. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr @foobar accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_mypolicy_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_policy_mypolicy_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_policy_mypolicy_allow {
ip daddr @foobar accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d'" != x"ignore"; then
            $as_echo "rich_destination_ipset.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_167
#AT_START_168
at_fn_group_banner 168 'zone.at:1' \
  "zone - target" "                                  " 7
at_xfail=no
(
  $as_echo "168. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/zone.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/zone.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/zone.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/zone.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:1"








    { set +x
$as_echo "$at_srcdir/zone.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/zone.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_foobar {
jump filter_INPUT_POLICIES_pre
jump filter_IN_foobar_pre
jump filter_IN_foobar_log
jump filter_IN_foobar_deny
jump filter_IN_foobar_allow
jump filter_IN_foobar_post
jump filter_INPUT_POLICIES_post
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/zone.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_foobar {
jump filter_FORWARD_POLICIES_pre
jump filter_FWD_foobar_pre
jump filter_FWD_foobar_log
jump filter_FWD_foobar_deny
jump filter_FWD_foobar_allow
jump filter_FWD_foobar_post
jump filter_FORWARD_POLICIES_post
accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/zone.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/zone.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_foobar {
jump filter_INPUT_POLICIES_pre
jump filter_IN_foobar_pre
jump filter_IN_foobar_log
jump filter_IN_foobar_deny
jump filter_IN_foobar_allow
jump filter_IN_foobar_post
jump filter_INPUT_POLICIES_post
meta l4proto { icmp, ipv6-icmp } accept
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/zone.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWD_foobar {
jump filter_FORWARD_POLICIES_pre
jump filter_FWD_foobar_pre
jump filter_FWD_foobar_log
jump filter_FWD_foobar_deny
jump filter_FWD_foobar_allow
jump filter_FWD_foobar_post
jump filter_FORWARD_POLICIES_post
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }















        if test x"ignore" != x"ignore"; then
            $as_echo "zone.at:164" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:164"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_168
#AT_START_169
at_fn_group_banner 169 'rpfilter.at:1' \
  "rpfilter" "                                       " 7
at_xfail=no
(
  $as_echo "169. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rpfilter.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :

    else
        :

                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf

    fi



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late




        cat >./nft_rule_index.nft <<'_ATEOF'

            add table inet firewalld_check_rule_index
            add chain inet firewalld_check_rule_index foobar { type filter hook input priority 0 ; }
            add rule inet firewalld_check_rule_index foobar tcp dport 1234 accept
            add rule inet firewalld_check_rule_index foobar accept
            insert rule inet firewalld_check_rule_index foobar index 1 udp dport 4321 accept
_ATEOF


    { set +x
$as_echo "$at_srcdir/rpfilter.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft -f ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft -f ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



        if test "$(     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft list chain inet firewalld_check_rule_index foobar | head -n 5 |tail -n 1 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  )" = "udp dport 4321 accept"; then
            :

        else
            :

            { set +x
$as_echo "$at_srcdir/rpfilter.at:1: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi


    { set +x
$as_echo "$at_srcdir/rpfilter.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} rm ./nft_rule_index.nft "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} rm ./nft_rule_index.nft
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rpfilter.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} nft delete table inet firewalld_check_rule_index "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} nft delete table inet firewalld_check_rule_index
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rpfilter.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :






    { set +x
$as_echo "$at_srcdir/rpfilter.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rpfilter.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
icmpv6 type { nd-router-advert, nd-neighbor-solicit } accept
meta nfproto ipv6 fib saddr . mark . iif oif missing drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    else
        :






    { set +x
$as_echo "$at_srcdir/rpfilter.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { nft \$NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'         -e 's/reject with icmp\\(x\\|v6\\)\\? type port-unreachable/reject/'                 -e 's/\\(iifname\\|oifname\\) [{] \\([^, ]\\+\\) [}]/\\1 \\2/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rpfilter.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { nft $NFT_NUMERIC_ARGS list chain inet firewalld filter_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'         -e 's/reject with icmp\(x\|v6\)\? type port-unreachable/reject/'                 -e 's/\(iifname\|oifname\) [{] \([^, ]\+\) [}]/\1 \2/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_PREROUTING {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    fi








        if test x"" != x"ignore"; then
            $as_echo "rpfilter.at:30" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:30"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_169
#AT_START_170
at_fn_group_banner 170 'firewall-cmd.at:5' \
  "basic options" "                                  " 8
at_xfail=no
(
  $as_echo "170. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:5"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --help "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -V "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --panic-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-panic "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_170
#AT_START_171
at_fn_group_banner 171 'firewall-cmd.at:28' \
  "get/list options" "                               " 8
at_xfail=no
(
  $as_echo "171. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:28"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_171
#AT_START_172
at_fn_group_banner 172 'firewall-cmd.at:44' \
  "default zone" "                                   " 8
at_xfail=no
(
  $as_echo "172. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:44"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_172
#AT_START_173
at_fn_group_banner 173 'firewall-cmd.at:56' \
  "user zone" "                                      " 8
at_xfail=no
(
  $as_echo "173. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:56"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=123456789abcefghij
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/firewall-cmd.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_TARGET: BAD/d'              -e '/ERROR: INVALID_NAME: Zone of/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:73" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TARGET: BAD/d'              -e '/ERROR: INVALID_NAME: Zone of/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:73"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_173
#AT_START_174
at_fn_group_banner 174 'firewall-cmd.at:76' \
  "zone interfaces" "                                " 8
at_xfail=no
(
  $as_echo "174. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:76"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:76"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:76: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:76"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:76"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:76"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:76"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:76" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:76"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=bar --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-interface foo --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-interface foo --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-interface bar --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-interface bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-default-zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=bar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=trusted --add-interface=+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=trusted --add-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:154"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=trusted --remove-interface=+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=trusted --remove-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:167"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:170"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:172" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:172"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_174
#AT_START_175
at_fn_group_banner 175 'firewall-cmd.at:174' \
  "zone sources" "                                   " 8
at_xfail=no
(
  $as_echo "175. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:174"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:174"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:174: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:174"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:174"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:174"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:174"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:174" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:174"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:215"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi








        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:224" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed  -e '/ERROR: ZONE_CONFLICT/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:224"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_175
#AT_START_176
at_fn_group_banner 176 'firewall-cmd.at:226' \
  "services" "                                       " 8
at_xfail=no
(
  $as_echo "176. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:226"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:226"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:226"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:226"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:226" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:226"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:268" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:268"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_176
#AT_START_177
at_fn_group_banner 177 'firewall-cmd.at:270' \
  "user services" "                                  " 8
at_xfail=no
(
  $as_echo "177. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:270"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:270"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:270"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:270"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:270" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:270"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:312"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:313:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:313"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:313"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --add-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --get-service-helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-helper=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:322:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:322"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:322"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:326:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:326"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:326"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:334:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:334"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:334"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:338"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF




        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:349" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:349"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_177
#AT_START_178
at_fn_group_banner 178 'firewall-cmd.at:352' \
  "ports" "                                          " 8
at_xfail=no
(
  $as_echo "178. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:352"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:352"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:352"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:352"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:352" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:352"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:369:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:369"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:369"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:378"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:385:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:385"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:385"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:392:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:392"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:392"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:395:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:395"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:395"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:407" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:407"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_178
#AT_START_179
at_fn_group_banner 179 'firewall-cmd.at:409' \
  "source ports" "                                   " 8
at_xfail=no
(
  $as_echo "179. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:409"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:409"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:409"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:409"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:409" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:409"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:415:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:415"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:415"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:444" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:444"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_179
#AT_START_180
at_fn_group_banner 180 'firewall-cmd.at:446' \
  "protocols" "                                      " 8
at_xfail=no
(
  $as_echo "180. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:446"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:446"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:446"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:446"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:446" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:446"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:458:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:458"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:466:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:466"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:466"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:472" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:472"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_180
#AT_START_181
at_fn_group_banner 181 'firewall-cmd.at:474' \
  "masquerade" "                                     " 8
at_xfail=no
(
  $as_echo "181. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:474"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:474"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:474: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:474"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:474"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:474"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:474"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:474" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:474"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:495:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:495"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:495"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:499" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:499"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_181
#AT_START_182
at_fn_group_banner 182 'firewall-cmd.at:501' \
  "forward" "                                        " 8
at_xfail=no
(
  $as_echo "182. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:501"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:501"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:501"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:501"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:501" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:501"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy --add-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:519"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:523:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:523"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:523"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:551"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:567:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:567"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:567"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-interface=dummy --add-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:577:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:577"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:577"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:588"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_home_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_home_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:597"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=home --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-interface=dummy --remove-interface=dummy3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=home --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:600"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-default-zone |grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-default-zone |grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-interface dummy4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-interface dummy4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:614"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:617:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:617"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:617"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:626"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 1234::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:651"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:654:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:654"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:654"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:656:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:656"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:656"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:657:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:657"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=4321::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:657"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 10.10.10.0/24
ACCEPT all -- 0.0.0.0/0 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 4321::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:676"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:683"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:685"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi







        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:687" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:687"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_182
#AT_START_183
at_fn_group_banner 183 'firewall-cmd.at:689' \
  "forward ports" "                                  " 8
at_xfail=no
(
  $as_echo "183. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:689"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:689"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:689"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:689"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:689" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:689"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:692"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:693"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:11 to::22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:705"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:709"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:4.4.4.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:723"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:725"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:727"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:729:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:729"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:729"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:730:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:730"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:730"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:731"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT sctp ::/0 ::/0 sctp dpt:66 to:[fd00:dead:beef:ff0::]:66
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:753"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:754"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:755:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:755"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:755"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:757"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:759"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:760:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:760"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:761"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:762:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:762"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:762"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:779"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:781"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:782"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:783"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:784"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:786" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:786"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_183
#AT_START_184
at_fn_group_banner 184 'firewall-cmd.at:788' \
  "ICMP block" "                                     " 8
at_xfail=no
(
  $as_echo "184. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:788"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:788"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:788"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:788"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:788" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:788"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:802"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:808"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:818:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:818"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:818"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:820:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:820"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:820"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:827:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:827"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:827"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:828:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:828"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:828"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:829"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:830:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:830"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:830"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:832" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:832"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_184
#AT_START_185
at_fn_group_banner 185 'firewall-cmd.at:834' \
  "user ICMP types" "                                " 8
at_xfail=no
(
  $as_echo "185. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:834"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:834"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:834: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:834"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:834"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:834"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:834"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:834" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:834"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:840:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:840"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:840"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:842:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:842"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:842"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:843:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:843"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:843"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:844:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:844"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:844"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:846"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:847:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:847"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:847"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:850:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:850"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:850"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:853:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:853"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:853"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:855" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/NAME_CONFLICT: new_icmptype():/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:855"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_185
#AT_START_186
at_fn_group_banner 186 'firewall-cmd.at:857' \
  "ipset" "                                          " 8
at_xfail=no
(
  $as_echo "186. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:857"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:857"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:857"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:857"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:857" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:857"









        $as_echo "firewall-cmd.at:860" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:860"






        $as_echo "firewall-cmd.at:861" >"$at_check_line_file"
(! $IPSET --help | grep "hash:mac") \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:861"
        $as_echo "firewall-cmd.at:861" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET create foobar hash:mac >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:861"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$IPSET destroy foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET destroy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:861"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:863:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:863"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:863"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:865:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:865"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:865"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:869"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:871"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:877:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:877"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:877"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:878"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:882"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,2000-2100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:888"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:901"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,udp:1000-1002
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }












        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:929:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:929"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,port
Members:
10.10.10.10,sctp:1234
10.10.10.10,udp:1000
10.10.10.10,udp:1001
10.10.10.10,udp:1002
20.20.20.20,tcp:8080
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:929"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:941:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:941"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:941"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:944:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:944"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,mark
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:944"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,0x100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:945"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:946:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:946"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:946"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.20,0x200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }












        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,mark
Members:
10.10.10.10,0x00000100
20.20.20.20,0x00000200
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:967"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:974"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:975"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:978:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:978"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:978"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:979:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:979"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:979"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:980"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:981:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:981"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:981"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:982:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:982"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:982"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234,10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:987"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:988:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:988"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:988"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:989:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:989"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=1.2.3.4,tcp:8080,1.6.0.0/16
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:989"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1000:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1000"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip,port,net
Members:
1.2.3.4,tcp:8080,1.6.0.0/16
10.10.10.10,sctp:1234,10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1000"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1007:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1007"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1007"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1008:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1008"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1008"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1011:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1011"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:net,iface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1011"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1012:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1012"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.0/24,foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1012"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1013:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1013"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1013"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=20.20.20.0/24,raboof0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1014"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }












        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1034:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1034"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net,iface
Members:
10.10.10.0/24,foobar0
20.20.20.0/24,raboof0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1034"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1041:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1041"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1041"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1042:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1042"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1042"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1042:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1042"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1042"
$at_failed && at_fn_log_failure
$at_traceon; }










    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1044:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1044"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1044"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi





        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1052" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY: invalid address/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1052"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_186
#AT_START_187
at_fn_group_banner 187 'firewall-cmd.at:1054' \
  "user helpers" "                                   " 8
at_xfail=no
(
  $as_echo "187. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1054"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1054"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1054: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1054"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1054"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1054"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1054"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1054"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1054" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1054"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1057:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1057"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:1057"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1058:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1058"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1058"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1059:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1059"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1059"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1060:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1060"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1060"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1061:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1061"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1061"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1062:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1062"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1062"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1063:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1063"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1063"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1064:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1064"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1064"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1066:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1066"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1066"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1068:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1068"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1071"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1072:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1072"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1072"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1073"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1074:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1074"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1074"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1075"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1076:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1076"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1076"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1078:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1078"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1078"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1079:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1079"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1079"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1080" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_MODULE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1080"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_187
#AT_START_188
at_fn_group_banner 188 'firewall-cmd.at:1082' \
  "direct" "                                         " 8
at_xfail=no
(
  $as_echo "188. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1082"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1082"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1082: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1082"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1082"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1082"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1082"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1082"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1082" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1082"






        $as_echo "firewall-cmd.at:1084" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1084"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1086"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1088"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1089:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1089"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1089"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1090:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1090"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1090"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1091"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1093:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1093"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1093"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1094"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1095"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1096:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1096"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1096"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1098:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1098"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1098"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1099"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:1117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1120"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1126"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1151"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1152"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1152"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1153" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1153"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_188
#AT_START_189
at_fn_group_banner 189 'firewall-cmd.at:1156' \
  "direct nat" "                                     " 8
at_xfail=no
(
  $as_echo "189. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1156"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1156"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1156: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1156"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1156"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1156"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1156"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1156"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1156" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1156"







        $as_echo "firewall-cmd.at:1159" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1159"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1167:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1167"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1167"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1169"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1170:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1170"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1170"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1171"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1172:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1172"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1172"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1176"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1179" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1179"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_189
#AT_START_190
at_fn_group_banner 190 'firewall-cmd.at:1181' \
  "direct passthrough" "                             " 8
at_xfail=no
(
  $as_echo "190. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1181"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1181: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1181"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1181"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1181"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1181"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1181"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1181" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1181"






        $as_echo "firewall-cmd.at:1183" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1183"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1185"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1186"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1188:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1188"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1188"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1189"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1190"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1191:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1191"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1191"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1192:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1192"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1192"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1193"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1194"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-passthrough ipv6 --table filter --append FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-passthroughs ipv6 | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-all-passthroughs | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep \"fd00:dead:beef:ff0::/64\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -nvL | grep "fd00:dead:beef:ff0::/64"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1196:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1196"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-passthrough ipv6 --table filter --delete FORWARD --destination fd00:dead:beef:ff0::/64 --in-interface dummy0 --out-interface dummy0 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1196"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1204:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1204"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1204"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1205"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1209"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"\\-nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1213:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1213"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1213"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1214:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1214"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1214"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1215:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1215"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1215"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1217" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: NOT_ENABLED: passthrough/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1217"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_190
#AT_START_191
at_fn_group_banner 191 'firewall-cmd.at:1219' \
  "direct ebtables" "                                " 8
at_xfail=no
(
  $as_echo "191. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1219"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1219"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1219: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1219"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1219"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1219"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1219"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1219"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1219" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1219"






        $as_echo "firewall-cmd.at:1221" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1221"






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1225"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1232"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1233"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1238"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L INPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L INPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1240"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1253"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1257"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1258"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1259"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1263" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1263"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_191
#AT_START_192
at_fn_group_banner 192 'firewall-cmd.at:1265' \
  "lockdown" "                                       " 8
at_xfail=no
(
  $as_echo "192. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1265"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1265: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1265"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1265"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1265"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1265"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1265" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1265"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1274"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1277"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1288"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1298"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1305"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1306:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1306"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1306"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1310"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1312:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1312"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1312"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:1314" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1314"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1315:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1315"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1315"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-on "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1316"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1317:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1317"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1317"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --lockdown-off "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-lockdown "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1319"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1320" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1320"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_192
#AT_START_193
at_fn_group_banner 193 'firewall-cmd.at:1332' \
  "rich rules good" "                                " 8
at_xfail=no
(
  $as_echo "193. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1332"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1332"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1332"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1332"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1332"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1332"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1332" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1332"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1335"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1336"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1337:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1337"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1337"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1338:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1338"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1338"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1339:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1339"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1339"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1340"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1348"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1349"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1351:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1351"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1351"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1352"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1353"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1355"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1359"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1360" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1360"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_193
#AT_START_194
at_fn_group_banner 194 'firewall-cmd.at:1361' \
  "rich rules audit" "                               " 8
at_xfail=no
(
  $as_echo "194. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1361"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1361"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1361: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1361"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1361"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1361"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1361"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1361"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1361" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1361"












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1365"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "firewall-cmd.at:1366" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1366"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_194
#AT_START_195
at_fn_group_banner 195 'firewall-cmd.at:1369' \
  "rich rules priority" "                            " 8
at_xfail=no
(
  $as_echo "195. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1369"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1369"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1369: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1369"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1369"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1369"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1369"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1369"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1369" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1369"




















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "INPUT_POLICIES_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_public_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_public_log all -- 0.0.0.0/0 0.0.0.0/0
IN_public_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_public_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_public_post all -- 0.0.0.0/0 0.0.0.0/0
INPUT_POLICIES_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1404"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1415:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1415"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FORWARD_POLICIES_pre all -- 0.0.0.0/0 0.0.0.0/0
FWD_public_pre all -- 0.0.0.0/0 0.0.0.0/0
FWD_public_log all -- 0.0.0.0/0 0.0.0.0/0
FWD_public_deny all -- 0.0.0.0/0 0.0.0.0/0
FWD_public_allow all -- 0.0.0.0/0 0.0.0.0/0
FWD_public_post all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_POLICIES_post all -- 0.0.0.0/0 0.0.0.0/0
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1415"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "INPUT_POLICIES_pre all ::/0 ::/0
IN_public_pre all ::/0 ::/0
IN_public_log all ::/0 ::/0
IN_public_deny all ::/0 ::/0
IN_public_allow all ::/0 ::/0
IN_public_post all ::/0 ::/0
INPUT_POLICIES_post all ::/0 ::/0
ACCEPT icmpv6 ::/0 ::/0
REJECT all ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1425"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FORWARD_POLICIES_pre all ::/0 ::/0
FWD_public_pre all ::/0 ::/0
FWD_public_log all ::/0 ::/0
FWD_public_deny all ::/0 ::/0
FWD_public_allow all ::/0 ::/0
FWD_public_post all ::/0 ::/0
FORWARD_POLICIES_post all ::/0 ::/0
REJECT all ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1436"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1456"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
AUDIT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 ctstate NEW,UNTRACKED AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1483"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1487"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3333 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1490"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG tcp ::/0 ::/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
AUDIT tcp ::/0 ::/0 tcp dpt:1122 ctstate NEW,UNTRACKED AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1496"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP tcp ::/0 ::/0 tcp dpt:2222 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1500"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:1122 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:3333 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1503"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1516"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1517"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1521:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1521"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1521"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1522"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1530"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1533"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1536"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1537"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1541"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1546"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1550"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1551"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1552"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1555"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1556"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1557:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1557"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1557"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=0 forward-port port=\"9090\" protocol=\"tcp\" to-port=\"90\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=0 forward-port port="9090" protocol="tcp" to-port="90"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"999\" protocol=\"tcp\" to-port=\"99\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="999" protocol="tcp" to-port="99"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"9999\" protocol=\"tcp\" to-port=\"9999\" to-addr=\"1234::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="9999" protocol="tcp" to-port="9999" to-addr="1234::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi









































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1647:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1647"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 10.1.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1647"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1650:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1650"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1650"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1653:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1653"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1653"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1655:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1655"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1655"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1657:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1657"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8888 to::80
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 to:10.1.1.1:80
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1657"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:222 to::22
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 to:10.1.1.1:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1661"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1665:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1665"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 10.1.1.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1665"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 10.10.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1671:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1671"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1671"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1673"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1675"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1681:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1681"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1681"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1683:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1683"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1683"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp ::/0 ::/0 tcp dpt:999 to::99
DNAT tcp ::/0 ::/0 tcp dpt:9999 to:[1234::4321]:9999
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1685"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp ::/0 ::/0 tcp dpt:9090 to::90
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1689"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1692:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1692"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1692"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1694:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1694"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1694"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1696"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1699"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1703"
$at_failed && at_fn_log_failure
$at_traceon; }



























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1750"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1754"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1757"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1761:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1761"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1761"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1763"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1765"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 1 reject-with icmp6-adm-prohibited
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 128
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1767"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 1 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1771"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1774:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1774"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 128
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1774"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1779:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1779"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1779"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1781:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1781"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1781"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1783:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1783"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1783"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1794"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1795:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1795"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1795"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1797"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1798:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1798"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1798"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1799"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1800:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1800"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1800"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1805"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1806:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1806"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1806"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1807"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1808:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1808"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1808"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1811"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1856:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1856"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG all -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED
ACCEPT all -- 10.10.10.0/24 0.0.0.0/0
LOG all -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
DROP all -- 10.0.0.0/8 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1856"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1864:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1864"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1864"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1867"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1869"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 ctstate NEW,UNTRACKED
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"'DROPPED: '\"
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1871"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG tcp ::/0 ::/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
DROP tcp ::/0 ::/0 tcp dpt:1111 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1879"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1883"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1887"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1889:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1889"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1889"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:143 ctstate NEW,UNTRACKED
LOG all ::/0 ::/0 LOG flags 0 level 4 prefix \"'DROPPED: '\"
DROP all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1891"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1899"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1900"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1900"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1905"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1935" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'              -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1935"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_195
#AT_START_196
at_fn_group_banner 196 'firewall-cmd.at:1940' \
  "rich rules bad" "                                 " 8
at_xfail=no
(
  $as_echo "196. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1940"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1940"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1940: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1940"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1940"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1940"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1940"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1940"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1940" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1940"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1947"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1948"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1949"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1950"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1952"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1953"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1954"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1955"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1956:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1956"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1956"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1957:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1957"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1957"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1958"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1959:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1959"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1959"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1961:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1961"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1961"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1966:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1966"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1966"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1967:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1967"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1967"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1968:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1968"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1968"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1969"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:1971" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1971"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_196
#AT_START_197
at_fn_group_banner 197 'firewall-cmd.at:1976' \
  "config validation" "                              " 8
at_xfail=no
(
  $as_echo "197. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1976"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1976"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1976: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1976"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1976"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:1976"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1976"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1976"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1976" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1976"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1980"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1985: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1985"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1985"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1986: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1986"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1986"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1987:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1987"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1987"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1992: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1992"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1992"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2001:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2001"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2001"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2009:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2009"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2009"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2010: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2010"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2010"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2019:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2019"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2019"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2027:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2027"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2027"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2035:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2035"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2035"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2036: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2036"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2036"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2039: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:2039"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2039"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2046:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2046"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2046"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2058:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2058"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2058"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2065:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2065"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:2065"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2066: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2066"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2066"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2069: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:2069"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2069"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2075:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2075"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2075"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2082:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2082"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:2082"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2084:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2084"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2084"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2093: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2093"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2096: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:2096"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2096"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2103"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2111"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2112: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2112"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2112"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2115: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:2115"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2115"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2122"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2130"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2138"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2146"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2154"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2162"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:2171"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2179"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2180: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2180"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2180"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2183: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:2183"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2183"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2187:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2187"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:2187"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:2195"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2203"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:2211"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2219:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2219"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2219"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2227"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2235"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2243"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2251"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2259"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2267"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2275"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2290"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2303"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2318"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:2333"
$at_failed && at_fn_log_failure
$at_traceon; }









    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2335:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:2335"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2335"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:2351: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:2351"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:2351"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            $as_echo "firewall-cmd.at:2353" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:/d'              -e '/WARNING:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:2353"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_197
#AT_START_198
at_fn_group_banner 198 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 9
at_xfail=no
(
  $as_echo "198. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1514043.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_ZONES all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all ::/0 ::/0
INPUT_direct all ::/0 ::/0
INPUT_ZONES all ::/0 ::/0
LOG all ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all ::/0 ::/0 ctstate INVALID
LOG all ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all ::/0 ::/0
FORWARD_direct all ::/0 ::/0
RFC3964_IPv4 all ::/0 ::/0
FORWARD_ZONES all ::/0 ::/0
LOG all ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all ::/0 ::/0 ctstate INVALID
LOG all ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz1514043.at:84" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:84"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_198
#AT_START_199
at_fn_group_banner 199 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 9
at_xfail=no
(
  $as_echo "199. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1498923.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"






        $as_echo "rhbz1498923.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1498923.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:6: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:18: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            $as_echo "rhbz1498923.at:47" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/.*a-bogus-flag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:47"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_199
#AT_START_200
at_fn_group_banner 200 'pr181.at:1' \
  "combined zones name length check" "               " 9
at_xfail=no
(
  $as_echo "200. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "pr181.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/pr181.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "pr181.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_200
#AT_START_201
at_fn_group_banner 201 'gh287.at:1' \
  "ICMP block inversion" "                           " 9
at_xfail=no
(
  $as_echo "201. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh287.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh287.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh287.at:15" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_201
#AT_START_202
at_fn_group_banner 202 'individual_calls.at:1' \
  "individual calls" "                               " 9
at_xfail=no
(
  $as_echo "202. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "individual_calls.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/individual_calls.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_202
#AT_START_203
at_fn_group_banner 203 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 9
at_xfail=no
(
  $as_echo "203. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1534571.at:3"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_203
#AT_START_204
at_fn_group_banner 204 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 9
at_xfail=no
(
  $as_echo "204. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh290.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"






        $as_echo "gh290.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:3"



{ set +x
$as_echo "$at_srcdir/gh290.at:6: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:10: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:10"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:12: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:12"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:14" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:14"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:14" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:14"



    { set +x
$as_echo "$at_srcdir/gh290.at:15: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:.*mismatched tag.*/d'" != x"ignore"; then
            $as_echo "gh290.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:.*mismatched tag.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_204
#AT_START_205
at_fn_group_banner 205 'gh290.at:19' \
  "invalid syntax in xml files" "                    " 9
at_xfail=no
(
  $as_echo "205. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:19: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh290.at:19: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh290.at:19: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:19"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh290.at:19" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh290.at:19"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:19" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:19"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:19" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:19"





{ set +x
$as_echo "$at_srcdir/gh290.at:23: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:23"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:24: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:25: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:26: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:26"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:28: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:28"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:29: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:29"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:30: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:30"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:32" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:32"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:32" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:32"



    { set +x
$as_echo "$at_srcdir/gh290.at:33: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:33"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"-e '/ERROR:.*Missing attribute protocol for port.*/d'" != x"ignore"; then
            $as_echo "gh290.at:34" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR:.*Missing attribute protocol for port.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:34"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_205
#AT_START_206
at_fn_group_banner 206 'icmp_block_in_forward_chain.at:1' \
  "ICMP block not present FORWARD chain" "           " 9
at_xfail=no
(
  $as_echo "206. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/icmp_block_in_forward_chain.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 code 10 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"" != x"ignore"; then
            $as_echo "icmp_block_in_forward_chain.at:26" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_206
#AT_START_207
at_fn_group_banner 207 'pr323.at:1' \
  "GRE proto helper" "                               " 9
at_xfail=no
(
  $as_echo "207. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "pr323.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"" != x"ignore"; then
            $as_echo "pr323.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_207
#AT_START_208
at_fn_group_banner 208 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 9
at_xfail=no
(
  $as_echo "208. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"









        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d'               -e '/WARNING: NOT_ENABLED/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_208
#AT_START_209
at_fn_group_banner 209 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 9
at_xfail=no
(
  $as_echo "209. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1594657.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"






        $as_echo "rhbz1594657.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1594657.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --passthrough ipv6 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi



        if test x"" != x"ignore"; then
            $as_echo "rhbz1594657.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_209
#AT_START_210
at_fn_group_banner 210 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 9
at_xfail=no
(
  $as_echo "210. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1571957.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_210
#AT_START_211
at_fn_group_banner 211 'rhbz1404076.at:1' \
  "query single port added with range" "             " 9
at_xfail=no
(
  $as_echo "211. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1404076.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"










    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:70"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:71"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:72"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q  --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd  --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd  --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8070-8080/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9050-10050/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085-8087/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8080-8089/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8081-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10000-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9999/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10011/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9095-10000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9090-9094/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9099-10001/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10005-10020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10021-10022/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9080-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=9079-10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9093-10025/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-source-port=10010-10015/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '10010-10015:tcp' already in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=9090-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9000/tcp 9010-9020/tcp 9079-10041/tcp 10050-10060/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9000/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9010-9020/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10050-10060/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9079/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10041/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=9080-9085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10035-10040/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10005-10009/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-source-port=10100-10110/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73: grep \"WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1404076.at:73"
( $at_check_trace; grep "WARNING: NOT_ENABLED: '10100-10110:tcp' not in 'public'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10001-10004/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10016-10019/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10003-10030/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10004-10005/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --query-source-port=10009-10010/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "9000/dccp 9050-10050/sctp 8080-8090/tcp 9086-10004/tcp 10010-10034/tcp 8070-8080/udp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1404076.at:76" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d'              -e '/WARNING: NOT_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:76"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_211
#AT_START_212
at_fn_group_banner 212 'gh366.at:1' \
  "service destination multiple IP versions" "       " 9
at_xfail=no
(
  $as_echo "212. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh366.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh366.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "gh366.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_212
#AT_START_213
at_fn_group_banner 213 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 9
at_xfail=no
(
  $as_echo "213. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"









        $as_echo "rhbz1601610.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1601610.at:4"







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '10.1.0.0/22' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1601610.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --query-entry 10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }









        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }










        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi



{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:89: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:89"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }










        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi





        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1601610.at:108" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'              -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:108"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_213
#AT_START_214
at_fn_group_banner 214 'gh303.at:1' \
  "unicode in XML" "                                 " 9
at_xfail=no
(
  $as_echo "214. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh303.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh303.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh303.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_214
#AT_START_215
at_fn_group_banner 215 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 9
at_xfail=no
(
  $as_echo "215. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh335.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh335.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr=\"1234:5678::4321\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr="1234:5678::4321"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi




    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"1234:5678::4321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="1234:5678::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }






    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



    if sysctl -a |grep -F "net.ipv6" >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh335.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi





    { set +x
$as_echo "$at_srcdir/gh335.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






        if test x"-e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d'" != x"ignore"; then
            $as_echo "gh335.at:68" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: Failed to write to file .*\/proc\/sys\/net\/ipv6\/conf\/all\/forwarding.*/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:68"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_215
#AT_START_216
at_fn_group_banner 216 'gh482.at:1' \
  "remove forward-port after reload" "               " 9
at_xfail=no
(
  $as_echo "216. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh482.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh482.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "gh482.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_216
#AT_START_217
at_fn_group_banner 217 'gh478.at:1' \
  "rich rule marks every packet" "                   " 9
at_xfail=no
(
  $as_echo "217. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh478.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh478.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh478.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1234 MARK set 0xa
MARK icmp -- 0.0.0.0/0 0.0.0.0/0 MARK set 0xb
MARK tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:4321 MARK set 0xc
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh478.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK tcp ::/0 ::/0 tcp dpt:1234 MARK set 0xa
MARK icmp ::/0 ::/0 MARK set 0xb
MARK tcp ::/0 ::/0 tcp spt:4321 MARK set 0xc
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "gh478.at:28" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_217
#AT_START_218
at_fn_group_banner 218 'gh258.at:1' \
  "zone dispatch layout" "                           " 9
at_xfail=no
(
  $as_echo "218. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh258.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh258.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/gh258.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source=\"dead:beef::/54\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source="dead:beef::/54"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=trusted --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



















    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :





    else
        :





    fi

























    { set +x
$as_echo "$at_srcdir/gh258.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_trusted all -- 1.2.3.0/24 0.0.0.0/0 [goto]
IN_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_ZONES all -- 0.0.0.0/0 0.0.0.0/0
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_trusted all -- 1.2.3.0/24 0.0.0.0/0 [goto]
FWD_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWD_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWD_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_trusted all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PRE_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:171:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:171"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:171"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_trusted all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PRE_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_trusted all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PRE_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:191:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:191"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
POSTROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:191"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_trusted all -- 0.0.0.0/0 1.2.3.0/24 [goto]
POST_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }












    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all ::/0 ::/0
INPUT_direct all ::/0 ::/0
INPUT_ZONES all ::/0 ::/0
DROP all ::/0 ::/0 ctstate INVALID
REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:202"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_public all dead:beef::/54 ::/0 [goto]
IN_trusted all ::/0 ::/0 [goto]
IN_public all ::/0 ::/0 [goto]
IN_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all ::/0 ::/0
FORWARD_direct all ::/0 ::/0
RFC3964_IPv4 all ::/0 ::/0
FORWARD_ZONES all ::/0 ::/0
DROP all ::/0 ::/0 ctstate INVALID
REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_public all dead:beef::/54 ::/0 [goto]
FWD_trusted all ::/0 ::/0 [goto]
FWD_public all ::/0 ::/0 [goto]
FWD_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all ::/0 ::/0
PREROUTING_ZONES all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:231"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_public all dead:beef::/54 ::/0 [goto]
PRE_trusted all ::/0 ::/0 [goto]
PRE_public all ::/0 ::/0 [goto]
PRE_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 134
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 135
DROP all ::/0 ::/0 rpfilter validmark invert
PREROUTING_direct all ::/0 ::/0
PREROUTING_ZONES all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_public all dead:beef::/54 ::/0 [goto]
PRE_trusted all ::/0 ::/0 [goto]
PRE_public all ::/0 ::/0 [goto]
PRE_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all ::/0 ::/0
PREROUTING_ZONES all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_public all dead:beef::/54 ::/0 [goto]
PRE_trusted all ::/0 ::/0 [goto]
PRE_public all ::/0 ::/0 [goto]
PRE_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct all ::/0 ::/0
POSTROUTING_ZONES all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/gh258.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public all ::/0 dead:beef::/54 [goto]
POST_trusted all ::/0 ::/0 [goto]
POST_public all ::/0 ::/0 [goto]
POST_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "gh258.at:275" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:275"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_218
#AT_START_219
at_fn_group_banner 219 'rhbz1715977.at:1' \
  "rich rule src/dst with service destination" "     " 9
at_xfail=no
(
  $as_echo "219. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1715977.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 192.168.122.235 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.111.222/32\" source address=\"10.10.10.0/24\" service name=\"ssh\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.111.222/32" source address="10.10.10.0/24" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 192.168.122.235 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 10.10.10.0/24 192.168.111.222 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name=\"ssdp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 service name="ssdp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 192.168.122.235 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 10.10.10.0/24 192.168.111.222 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_internal_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1715977.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_internal_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            $as_echo "rhbz1715977.at:106" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: Destination conflict with service/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:106"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_219
#AT_START_220
at_fn_group_banner 220 'rhbz1723610.at:1' \
  "direct remove-rules per family" "                 " 9
at_xfail=no
(
  $as_echo "220. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1723610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1723610.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1723610.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1723610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:1"






        $as_echo "rhbz1723610.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1723610.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv6 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --remove-rules ipv4 filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --remove-rules ipv4 filter OUTPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1723610.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter OUTPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.1 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1723610.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1723610.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --query-rule ipv4 filter INPUT 0 -d 127.0.0.2 -p tcp --dport 22 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1723610.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1723610.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1723610.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_220
#AT_START_221
at_fn_group_banner 221 'rhbz1734765.at:1' \
  "zone sources ordered by name" "                   " 9
at_xfail=no
(
  $as_echo "221. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1734765.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1734765.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1734765.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1734765.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_00
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_05
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_02
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_03
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_01
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_04
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_010
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_011
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-zone=foobar_012
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv4' --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset 'ipsetv6' --type hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv4 --add-entry '192.0.2.12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset ipsetv6 --add-entry '::2'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_011 --add-source ipset:ipsetv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"10.1.1.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="10.1.1.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"10.1.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="10.1.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"10.2.0.0/16\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="10.2.0.0/16"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"10.1.1.1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="10.1.1.1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"10.2.2.0/24\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="10.2.2.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"10.0.0.0/8\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="10.0.0.0/8"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source=\"1234:5678::1:1:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_01 --add-source="1234:5678::1:1:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source=\"1234:5678::1:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_02 --add-source="1234:5678::1:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source=\"1234:5678::2:0:0/96\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_04 --add-source="1234:5678::2:0:0/96"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source=\"1234:5678::2:2:0/112\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_03 --add-source="1234:5678::2:2:0/112"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source=\"1234:5678::0:0:0/80\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_05 --add-source="1234:5678::0:0:0/80"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source=\"1234:5678::1:1:1\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=foobar_00 --add-source="1234:5678::1:1:1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=trusted --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"10.10.10.10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="10.10.10.10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"20.20.20.20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="20.20.20.20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source=\"1234:5678::10:10:10\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-source="1234:5678::10:10:10"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=public --add-source=\"1234:5678::20:20:20\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=public --add-source="1234:5678::20:20:20"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_012 --add-source ipset:ipsetv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1734765.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=foobar_010 --add-interface=foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_00 all -- 10.1.1.1 0.0.0.0/0 [goto]
IN_foobar_01 all -- 10.1.1.0/24 0.0.0.0/0 [goto]
IN_foobar_010 all -- 10.10.10.10 0.0.0.0/0 [goto]
IN_foobar_011 all -- 0.0.0.0/0 0.0.0.0/0 [goto] match-set ipsetv4 src
IN_foobar_02 all -- 10.1.0.0/16 0.0.0.0/0 [goto]
IN_foobar_03 all -- 10.2.2.0/24 0.0.0.0/0 [goto]
IN_foobar_04 all -- 10.2.0.0/16 0.0.0.0/0 [goto]
IN_foobar_05 all -- 10.0.0.0/8 0.0.0.0/0 [goto]
IN_public all -- 20.20.20.20 0.0.0.0/0 [goto]
IN_foobar_010 all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_internal all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_00 all 1234:5678::1:1:1 ::/0 [goto]
IN_foobar_01 all 1234:5678::1:1:0/112 ::/0 [goto]
IN_foobar_010 all 1234:5678::10:10:10 ::/0 [goto]
IN_foobar_012 all ::/0 ::/0 [goto] match-set ipsetv6 src
IN_foobar_02 all 1234:5678::1:0:0/96 ::/0 [goto]
IN_foobar_03 all 1234:5678::2:2:0/112 ::/0 [goto]
IN_foobar_04 all 1234:5678::2:0:0/96 ::/0 [goto]
IN_foobar_05 all 1234:5678::/80 ::/0 [goto]
IN_public all 1234:5678::20:20:20 ::/0 [goto]
IN_foobar_010 all ::/0 ::/0 [goto]
IN_trusted all ::/0 ::/0 [goto]
IN_internal all ::/0 ::/0 [goto]
IN_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar_00 all -- 0.0.0.0/0 10.1.1.1 [goto]
POST_foobar_01 all -- 0.0.0.0/0 10.1.1.0/24 [goto]
POST_foobar_010 all -- 0.0.0.0/0 10.10.10.10 [goto]
POST_foobar_011 all -- 0.0.0.0/0 0.0.0.0/0 [goto] match-set ipsetv4 dst
POST_foobar_02 all -- 0.0.0.0/0 10.1.0.0/16 [goto]
POST_foobar_03 all -- 0.0.0.0/0 10.2.2.0/24 [goto]
POST_foobar_04 all -- 0.0.0.0/0 10.2.0.0/16 [goto]
POST_foobar_05 all -- 0.0.0.0/0 10.0.0.0/8 [goto]
POST_public all -- 0.0.0.0/0 20.20.20.20 [goto]
POST_foobar_010 all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_trusted all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_internal all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1734765.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1734765.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar_00 all ::/0 1234:5678::1:1:1 [goto]
POST_foobar_01 all ::/0 1234:5678::1:1:0/112 [goto]
POST_foobar_010 all ::/0 1234:5678::10:10:10 [goto]
POST_foobar_012 all ::/0 ::/0 [goto] match-set ipsetv6 dst
POST_foobar_02 all ::/0 1234:5678::1:0:0/96 [goto]
POST_foobar_03 all ::/0 1234:5678::2:2:0/112 [goto]
POST_foobar_04 all ::/0 1234:5678::2:0:0/96 [goto]
POST_foobar_05 all ::/0 1234:5678::/80 [goto]
POST_public all ::/0 1234:5678::20:20:20 [goto]
POST_foobar_010 all ::/0 ::/0 [goto]
POST_trusted all ::/0 ::/0 [goto]
POST_internal all ::/0 ::/0 [goto]
POST_public all ::/0 ::/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1734765.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz1734765.at:189" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1734765.at:189"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_221
#AT_START_222
at_fn_group_banner 222 'gh567.at:1' \
  "rich rule source w/ mark action" "                " 9
at_xfail=no
(
  $as_echo "222. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh567.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh567.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh567.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh567.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh567.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh567.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh567.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh567.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:1"








        $as_echo "gh567.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/gh567.at:3"







    { set +x
$as_echo "$at_srcdir/gh567.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=Teste --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule \"rule family=ipv4 source ipset=Teste mark set=2\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --add-rich-rule "rule family=ipv4 source ipset=Teste mark set=2"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh567.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh567.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh567.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "gh567.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh567.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_222
#AT_START_223
at_fn_group_banner 223 'rhbz1779835.at:1' \
  "ipv6 address with brackets" "                     " 9
at_xfail=no
(
  $as_echo "223. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:1"








        $as_echo "rhbz1779835.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:3"








    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    else
        :
        $as_echo "rhbz1779835.at:5" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:5"
    fi







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry='[1234::4321]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset=foobar2 --type=hash:net --family=inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar2 --add-entry='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:14" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:14"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_223
#AT_START_224
at_fn_group_banner 224 'rhbz1779835.at:16' \
  "ipv6 address with brackets" "                     " 9
at_xfail=no
(
  $as_echo "224. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1779835.at:16"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1779835.at:16: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:16"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:16"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1779835.at:16" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:16"









    if $IP6TABLES -L >/dev/null 2>&1; then
        :

    else
        :
        $as_echo "rhbz1779835.at:19" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/rhbz1779835.at:19"
    fi







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[::1234]'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-source='[1234::]/64'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234] "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-forward-port=port=1234:proto=tcp:toport=4321:toaddr=[::1234]
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port=\"1234\" protocol=tcp to-port=\"4321\" to-addr=\"[::1234]\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 forward-port port="1234" protocol=tcp to-port="4321" to-addr="[::1234]"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 source address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[::4321] accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1779835.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1779835.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone internal --add-rich-rule='rule family=ipv6 destination address=[1234::]/64 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1779835.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1779835.at:36" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1779835.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_224
#AT_START_225
at_fn_group_banner 225 'gh330.at:1' \
  "ipset cleanup on reload/stop" "                   " 9
at_xfail=no
(
  $as_echo "225. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh330.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh330.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh330.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh330.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh330.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:1"





{ set +x
$as_echo "$at_srcdir/gh330.at:4: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:4"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi









    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh330.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






{ set +x
$as_echo "$at_srcdir/gh330.at:30: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:30"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }






        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi









    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/gh330.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --ipset foobar --add-entry 4.3.2.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
4.3.2.1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/gh330.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 6.6.6.6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
10.10.10.10
4.3.2.1
6.6.6.6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi








    { set +x
$as_echo "$at_srcdir/gh330.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/gh330.at:120: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh330.at:120"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/gh330.at:121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh330.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }






    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:123" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:123"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:123" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:123"





    { set +x
$as_echo "$at_srcdir/gh330.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh330.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --delete-ipset foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }





    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }



        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh330.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh330.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh330.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh330.at:142" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh330.at:142"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh330.at:142" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:142"




        if test x"" != x"ignore"; then
            $as_echo "gh330.at:144" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh330.at:144"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_225
#AT_START_226
at_fn_group_banner 226 'gh599.at:1' \
  "writing to log after copytruncate" "              " 9
at_xfail=no
(
  $as_echo "226. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh599.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh599.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh599.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh599.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh599.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh599.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh599.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh599.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:1"





$as_echo "gh599.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which truncate >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:4"
$as_echo "gh599.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which wc >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:5"
$as_echo "gh599.at:6" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which expr >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh599.at:6"


    { set +x
$as_echo "$at_srcdir/gh599.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} truncate -s 0 ./firewalld.log "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} truncate -s 0 ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh599.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=this_does_not_exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/gh599.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh599.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} expr \$(cat ./firewalld.log | wc -c) \">\" 0 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh599.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} expr $(cat ./firewalld.log | wc -c) ">" 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh599.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"-e '/ERROR: INVALID_SERVICE: this_does_not_exist/d'" != x"ignore"; then
            $as_echo "gh599.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE: this_does_not_exist/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh599.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_226
#AT_START_227
at_fn_group_banner 227 'rhbz1829104.at:1' \
  "direct rule in zone chain" "                      " 9
at_xfail=no
(
  $as_echo "227. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1829104.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1829104.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1829104.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"






        $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1829104.at:1"






    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 raw PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 mangle PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat PRE_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter IN_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 filter FWD_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_pre 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_log 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_deny 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_allow 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1829104.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1829104.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --direct --add-rule ipv4 nat POST_public_post 0 -s 10.10.10.0/24 ! -d 10.0.0.0/8 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1829104.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1829104.at:1" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1829104.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_227
#AT_START_228
at_fn_group_banner 228 'rhbz1843398.at:1' \
  "rich rule source mac" "                           " 9
at_xfail=no
(
  $as_echo "228. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1843398.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1843398.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1843398.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1843398.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac=\"11:22:33:44:55:66\" reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule source mac="11:22:33:44:55:66" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1843398.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1843398.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1843398.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "rhbz1843398.at:8" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1843398.at:8"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_228
#AT_START_229
at_fn_group_banner 229 'rhbz1839781.at:1' \
  "service RH-Satellite-6" "                         " 9
at_xfail=no
(
  $as_echo "229. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1839781.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1839781.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1839781.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1839781.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-interface dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:69 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8140 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5000 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:5646:5647 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5671 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:53 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:53 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:67 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:69 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:68 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8140 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:5000 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpts:5646:5647 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:5671 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8000 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8080 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --remove-service RH-Satellite-6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1839781.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone trusted --add-service RH-Satellite-6-capsule
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:69 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8140 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5000 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpts:5646:5647 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:5671 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8000 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:9090 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8443 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1839781.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_trusted_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1839781.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_trusted_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:53 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:53 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:67 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:69 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:68 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8140 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:5000 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpts:5646:5647 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:5671 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8000 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8080 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:9090 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:8443 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1839781.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rhbz1839781.at:123" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1839781.at:123"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_229
#AT_START_230
at_fn_group_banner 230 'rhbz1689429.at:1' \
  "rich rule invalid priority" "                     " 9
at_xfail=no
(
  $as_echo "230. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1689429.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1689429.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1689429.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1689429.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule priority=foo accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Error: INVALID_PRIORITY: invalid 'priority' attribute value 'foo'.
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 139 $at_status "$at_srcdir/rhbz1689429.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1689429.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1689429.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1689429.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            $as_echo "rhbz1689429.at:12" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1689429.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_230
#AT_START_231
at_fn_group_banner 231 'rhbz1483921.at:1' \
  "direct and zone mutually exclusive" "             " 9
at_xfail=no
(
  $as_echo "231. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1483921.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1483921.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1483921.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1483921.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1483921.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:1"






        $as_echo "rhbz1483921.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1483921.at:3"






    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --permanent --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1483921.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1483921.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --direct --add-rule ipv4 nat OUTPUT 1 -p tcp --dport 8443 -j DNAT --to-port 9443
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1483921.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1483921.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1483921.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_231
#AT_START_232
at_fn_group_banner 232 'rhbz1541077.at:1' \
  "hash:mac and family mutually exclusive" "         " 9
at_xfail=no
(
  $as_echo "232. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1541077.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1541077.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1541077.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1541077.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1541077.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1541077.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/rhbz1541077.at:7: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6" "rhbz1541077.at:7"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --new-ipset hashmacv6 --type hash:mac --family inet6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1541077.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1541077.at:9" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1541077.at:9"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_232
#AT_START_233
at_fn_group_banner 233 'rhbz1855140.at:1' \
  "rich rule icmptypes with one family" "            " 9
at_xfail=no
(
  $as_echo "233. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1855140.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1855140.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1855140.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1855140.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name=\"timestamp-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule='rule icmp-type name="timestamp-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone public --add-rich-rule 'rule icmp-type name=bad-header mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 13
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK icmpv6 ::/0 ::/0 ipv6-icmptype 4 code 0 MARK or 0x86
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1855140.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 128
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 136
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1855140.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule icmp-type name=bogus mark set=0x86/0x86'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/rhbz1855140.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1855140.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule 'rule family=ipv6 icmp-type name=timestamp-request drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/rhbz1855140.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "rhbz1855140.at:53" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1855140.at:53"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_233
#AT_START_234
at_fn_group_banner 234 'rhbz1871298.at:1' \
  "rich rule parsing bottleneck" "                   " 9
at_xfail=no
(
  $as_echo "234. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1871298.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1871298.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1871298.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1871298.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:1"





$as_echo "rhbz1871298.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} which timeout >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1871298.at:4"


    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} mkdir -p ./zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"<short>foobar</short>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "<short>foobar</short>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} sh -c 'for I in \$(seq 10000); do echo \"<rule family=\\\"ipv4\\\"><port protocol=\\\"tcp\\\" port=\\\"\$I\\\" /><accept/></rule>\" >> ./zones/foobar.xml; done' "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1871298.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c 'for I in $(seq 10000); do echo "<rule family=\"ipv4\"><port protocol=\"tcp\" port=\"$I\" /><accept/></rule>" >> ./zones/foobar.xml; done'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} echo \"</zone>\" >> ./zones/foobar.xml "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} echo "</zone>" >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
    FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
fi

    { set +x
$as_echo "$at_srcdir/rhbz1871298.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} timeout 45 firewall-offline-cmd --system-config ./ \$FIREWALL_OFFLINE_CMD_ARGS --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1871298.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} timeout 45 firewall-offline-cmd --system-config ./ $FIREWALL_OFFLINE_CMD_ARGS --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1871298.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





        if test x"" != x"ignore"; then
            $as_echo "rhbz1871298.at:18" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1871298.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_234
#AT_START_235
at_fn_group_banner 235 'rhbz1596304.at:1' \
  "rich rules strip non-printable characters" "      " 9
at_xfail=no
(
  $as_echo "235. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1596304.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1596304.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1596304.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1596304.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family=\"ipv4\" source address=\"104.243.250.0/22	\" port port=80 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-rich-rule 'rule family="ipv4" source address="104.243.250.0/22	" port port=80 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1596304.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1596304.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1596304.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv4\" source address=\"104.243.250.0/22\" port port=\"80\" protocol=\"tcp\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1596304.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






        if test x"" != x"ignore"; then
            $as_echo "rhbz1596304.at:24" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1596304.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_235
#AT_START_236
at_fn_group_banner 236 'gh703.at:1' \
  "add source with mac address" "                    " 9
at_xfail=no
(
  $as_echo "236. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh703.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh703.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh703.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh703.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh703.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh703.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh703.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh703.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh703.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:1"








    { set +x
$as_echo "$at_srcdir/gh703.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh703.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=home --add-source=34:7e:5c:3a:4c:32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh703.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            $as_echo "gh703.at:17" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh703.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_236
#AT_START_237
at_fn_group_banner 237 'ipset_netmask_allowed.at:1' \
  "ipset netmask allowed type hash:ip" "             " 9
at_xfail=no
(
  $as_echo "237. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "ipset_netmask_allowed.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/ipset_netmask_allowed.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ipset_netmask_allowed.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:1"








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 4.3.2.1/32
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ipset_netmask_allowed.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ipset_netmask_allowed.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ipset_netmask_allowed.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --ipset foobar --add-entry 1.2.3.4/30
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/ipset_netmask_allowed.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_ENTRY:/d'" != x"ignore"; then
            $as_echo "ipset_netmask_allowed.at:25" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ENTRY:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ipset_netmask_allowed.at:25"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_237
#AT_START_238
at_fn_group_banner 238 'rhbz1940928.at:1' \
  "direct -s/-d multiple addresses" "                " 9
at_xfail=no
(
  $as_echo "238. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1940928.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1940928.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1940928.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:1"






        $as_echo "rhbz1940928.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1940928.at:3"



{ set +x
$as_echo "$at_srcdir/rhbz1940928.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1940928.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT tcp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT tcp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT tcp -- 0.0.0.0/0 192.168.0.0/24
ACCEPT udp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT udp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT udp -- 0.0.0.0/0 192.168.0.0/24
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --add-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT sctp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT sctp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT sctp -- 0.0.0.0/0 192.168.0.0/24
ACCEPT tcp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT tcp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT tcp -- 0.0.0.0/0 192.168.0.0/24
ACCEPT udp -- 0.0.0.0/0 10.0.0.0/8
ACCEPT udp -- 0.0.0.0/0 172.16.0.0/16
ACCEPT udp -- 0.0.0.0/0 192.168.0.0/24
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 0 -m state --state ESTABLISHED,RELATED -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 1 -p sctp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p tcp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 2 -p udp -d 10.0.0.0/8,172.16.0.0/16,192.168.0.0/24 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1940928.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --direct --remove-rule ipv4 filter OUTPUT 9 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1940928.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1940928.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1940928.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "rhbz1940928.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1940928.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_238
#AT_START_239
at_fn_group_banner 239 'rhbz1936896.at:1' \
  "ipset type hash:net,net" "                        " 9
at_xfail=no
(
  $as_echo "239. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1936896.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1936896.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1936896.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:1"








        $as_echo "rhbz1936896.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $IPSET -h >/dev/null 2>&1  ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1936896.at:3"







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-ipset testset --type hash:net,net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset=testset --add-entry=192.168.0.0/24,10.0.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1936896.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-ipset=testset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "testset
type: hash:net,net
options:
entries: 192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/rhbz1936896.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list testset; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1936896.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list testset; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: testset
Type: hash:net,net
Members:
192.168.0.0/24,10.0.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1936896.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi









        if test x"" != x"ignore"; then
            $as_echo "rhbz1936896.at:32" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1936896.at:32"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_239
#AT_START_240
at_fn_group_banner 240 'gh795.at:1' \
  "ipset entry delete w/ timeout=0" "                " 9
at_xfail=no
(
  $as_echo "240. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh795.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/gh795.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh795.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/gh795.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "gh795.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh795.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh795.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh795.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh795.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:1"








    { set +x
$as_echo "$at_srcdir/gh795.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset foobar --type=hash:ip --option=timeout=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh795.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "Warning: ALREADY_ENABLED: '1.2.3.4' already is in 'foobar'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --add-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }











        if $IPSET list >/dev/null 2>&1; then

    { set +x
$as_echo "$at_srcdir/gh795.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPSET list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh795.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPSET list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:ip
Members:
1.2.3.4 timeout 0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }


        fi






    { set +x
$as_echo "$at_srcdir/gh795.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --remove-entry 1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh795.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --ipset foobar --get-entries "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh795.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --ipset foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh795.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "gh795.at:48" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/gh795.at:48"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_240
#AT_START_241
at_fn_group_banner 241 'rhbz1914935.at:1' \
  "zone overlapping ports" "                         " 9
at_xfail=no
(
  $as_echo "241. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1914935.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rhbz1914935.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1914935.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1914935.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1914935.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "rhbz1914935.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-65535" protocol="tcp" />
<port port="1234" protocol="tcp" />
<port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:15: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:15"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:16: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:16"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-65535" protocol="tcp" />
<source-port port="1234" protocol="tcp" />
<source-port port="2000-3000" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:30: grep \"WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:30"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1234:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:31: grep \"WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:31"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '2000-3000:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-65535/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port port="1024-2000" protocol="tcp" />
<port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:45: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:45"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="1024-2000" protocol="tcp" />
<source-port port="1500-2500" protocol="tcp" />
</zone>
_ATEOF





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:59: grep \"WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'\" ./firewalld.log"
at_fn_check_prepare_trace "rhbz1914935.at:59"
( $at_check_trace; grep "WARNING: ALREADY_ENABLED: '1500-2500:tcp' already in 'foobar'" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1914935.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1914935.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone foobar --list-source-ports "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1914935.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone foobar --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1024-2500/tcp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1914935.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/WARNING: ALREADY_ENABLED:/d'" != x"ignore"; then
            $as_echo "rhbz1914935.at:64" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/WARNING: ALREADY_ENABLED:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1914935.at:64"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_241
#AT_START_242
at_fn_group_banner 242 'python.at:3' \
  "firewalld_test.py" "                              " 10
at_xfail=no
(
  $as_echo "242. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:3" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:3"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:6" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_242
#AT_START_243
at_fn_group_banner 243 'python.at:8' \
  "firewalld_config.py" "                            " 10
at_xfail=no
(
  $as_echo "243. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:8" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:8"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:11" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_243
#AT_START_244
at_fn_group_banner 244 'python.at:13' \
  "firewalld_rich.py" "                              " 10
at_xfail=no
(
  $as_echo "244. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:13" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:13"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:16" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_244
#AT_START_245
at_fn_group_banner 245 'python.at:18' \
  "firewalld_direct.py" "                            " 10
at_xfail=no
(
  $as_echo "245. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "python.at:18" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:18"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"






        $as_echo "python.at:20" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/python.at:20"



    { set +x
$as_echo "$at_srcdir/python.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} \$PYTHON \$(dirname \${at_myself})/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a $(...) command substitution' "python.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} $PYTHON $(dirname ${at_myself})/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




        if test x"ignore" != x"ignore"; then
            $as_echo "python.at:22" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/python.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_245
#AT_START_246
at_fn_group_banner 246 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 11
at_xfail=no
(
  $as_echo "246. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rfc3964_ipv4.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

















    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG all ::/0 2002:e000::/19 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002:e000::/19 reject-with icmp6-addr-unreachable
LOG all ::/0 2002:a9fe::/32 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002:a9fe::/32 reject-with icmp6-addr-unreachable
LOG all ::/0 2002:c0a8::/32 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002:c0a8::/32 reject-with icmp6-addr-unreachable
LOG all ::/0 2002:ac10::/28 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002:ac10::/28 reject-with icmp6-addr-unreachable
LOG all ::/0 2002:7f00::/24 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002:7f00::/24 reject-with icmp6-addr-unreachable
LOG all ::/0 2002:a00::/24 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002:a00::/24 reject-with icmp6-addr-unreachable
LOG all ::/0 2002::/24 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 2002::/24 reject-with icmp6-addr-unreachable
LOG all ::/0 ::ffff:0.0.0.0/96 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 ::ffff:0.0.0.0/96 reject-with icmp6-addr-unreachable
LOG all ::/0 ::/96 LOG flags 0 level 4 prefix \"RFC3964_IPv4_REJECT: \"
REJECT all ::/0 ::/96 reject-with icmp6-addr-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all ::/0 ::/0
FORWARD_direct all ::/0 ::/0
RFC3964_IPv4 all ::/0 ::/0
FORWARD_ZONES all ::/0 ::/0
LOG all ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all ::/0 ::/0 ctstate INVALID
LOG all ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED
ACCEPT all ::/0 ::/0
OUTPUT_direct all ::/0 ::/0
RFC3964_IPv4 all ::/0 ::/0
OUTPUT_POLICIES_pre all ::/0 ::/0
OUTPUT_POLICIES_post all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi






{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:74: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:74"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }


















    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L RFC3964_IPv4; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/rfc3964_ipv4.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all ::/0 ::/0
FORWARD_direct all ::/0 ::/0
FORWARD_ZONES all ::/0 ::/0
LOG all ::/0 ::/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all ::/0 ::/0 ctstate INVALID
LOG all ::/0 ::/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all ::/0 ::/0 ctstate RELATED,ESTABLISHED
ACCEPT all ::/0 ::/0
OUTPUT_direct all ::/0 ::/0
OUTPUT_POLICIES_pre all ::/0 ::/0
OUTPUT_POLICIES_post all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rfc3964_ipv4.at:121" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:121"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_246
#AT_START_247
at_fn_group_banner 247 'service_include.at:1' \
  "service include" "                                " 11
at_xfail=no
(
  $as_echo "247. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "service_include.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service_include.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/service_include.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:12345 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/service_include.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp ::/0 ff02::c udp dpt:1900 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ff02::fb udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:12345 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/service_include.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:94: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:94"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:96: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:96"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:97: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:97"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:99: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:99"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:100: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:100"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/service_include.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --list-services "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dhcpv6-client ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR: INVALID_SERVICE: does-not-exist/d'" != x"ignore"; then
            $as_echo "service_include.at:126" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE: does-not-exist/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:126"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_247
#AT_START_248
at_fn_group_banner 248 'helpers_custom.at:1' \
  "customer helpers" "                               " 11
at_xfail=no
(
  $as_echo "248. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "helpers_custom.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/helpers_custom.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/helpers_custom.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "helpers_custom.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "helpers_custom.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:1"








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-helper=\"ftptest\" --module=\"nf_conntrack_ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-helper="ftptest" --module="nf_conntrack_ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --helper=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --new-service=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --new-service="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"2121/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="2121/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules: ftptest
destination:
includes:
helpers:
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/helpers_custom.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --query-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/helpers_custom.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-service=ftptest | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ftptest
ports: 2121/tcp
protocols:
source-ports:
modules:
destination:
includes:
helpers: ftptest
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/helpers_custom.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-module="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper=\"ftptest\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --remove-helper="ftptest"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper=\"ftp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-helper="ftp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port=\"21/tcp\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --permanent --service=ftptest --add-port="21/tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/helpers_custom.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/helpers_custom.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --add-service=ftptest "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "helpers_custom.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --add-service=ftptest
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/helpers_custom.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/helpers_custom.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2121 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp ::/0 ::/0 tcp dpt:21 CT helper ftp
CT tcp ::/0 ::/0 tcp dpt:2121 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/helpers_custom.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "helpers_custom.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 fe80::/64 udp dpt:546 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:2121 ctstate NEW,UNTRACKED
ACCEPT tcp ::/0 ::/0 tcp dpt:21 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/helpers_custom.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "helpers_custom.at:156" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/helpers_custom.at:156"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_248
#AT_START_249
at_fn_group_banner 249 'policy.at:5' \
  "policy - xml" "                                   " 11
at_xfail=no
(
  $as_echo "249. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:5"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:5"





{ set +x
$as_echo "$at_srcdir/policy.at:8: mkdir -p ./policies"
at_fn_check_prepare_trace "policy.at:8"
( $at_check_trace; mkdir -p ./policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./policies/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-123">
<short>foobar</short>
<description>foobar policy</description>
<ingress-zone name="public" />
<egress-zone name="ANY" />
<service name="ssh" />
<service name="https" />
<port port="1234" protocol="tcp" />
<icmp-block name="echo-request" />
<masquerade />
<forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
<source-port port="1234" protocol="udp" />
<protocol value="ipv6-icmp" />
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <destination address="192.168.10.0/24" />
    <service name="ssh" />
    <accept>
        <limit value="5/m" />
    </accept>
</rule>
<rule>
    <port port="1234" protocol="tcp" />
    <reject />
</rule>
<rule family="ipv4">
    <source address="10.10.10.0/24" />
    <icmp-block name="echo-request" />
</rule>
<rule>
    <icmp-type name="echo-reply" />
    <drop />
</rule>
<rule family="ipv4">
    <forward-port port="1234" protocol="tcp" to-port="4321" to-addr="10.10.10.1" />
</rule>
<rule>
    <source-port port="1234" protocol="udp" />
    <log prefix="LOG: " level="warning" />
</rule>
<rule family="ipv6">
    <protocol value="ipv6-icmp" />
    <audit />
    <accept />
</rule>
<rule family="ipv4">
    <destination address="192.168.10.0/24" />
    <mark set="123" />
</rule>
</policy>
_ATEOF




    { set +x
$as_echo "$at_srcdir/policy.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            $as_echo "policy.at:67" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:67"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_249
#AT_START_250
at_fn_group_banner 250 'policy.at:73' \
  "policy - create" "                                " 11
at_xfail=no
(
  $as_echo "250. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:73: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:73: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:73"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:73: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:73"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:73: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:73"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:73" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:73"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:73" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:73"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:73" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:73"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:73" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:73"








    { set +x
$as_echo "$at_srcdir/policy.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy hostToWorld
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy zoneToZone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 hostToWorld worldToHost zoneToZone
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:88" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:88"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_250
#AT_START_251
at_fn_group_banner 251 'policy.at:90' \
  "policy - name" "                                  " 11
at_xfail=no
(
  $as_echo "251. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:90: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:90: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:90"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:90: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:90"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:90: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:90"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:90" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:90"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:90" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:90"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:90" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:90"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:90" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:90"








    { set +x
$as_echo "$at_srcdir/policy.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 123456789012345678
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy 1234567890123456789
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 116 $at_status "$at_srcdir/policy.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/policy.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d'" != x"ignore"; then
            $as_echo "policy.at:101" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_NAME:/d' -e '/ERROR: NAME_CONFLICT:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:101"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_251
#AT_START_252
at_fn_group_banner 252 'policy.at:103' \
  "policy - list" "                                  " 11
at_xfail=no
(
  $as_echo "252. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:103: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:103: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:103"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:103: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:103"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:103: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:103"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:103"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:103" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:103"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:103" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:103"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:103" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:103"








    { set +x
$as_echo "$at_srcdir/policy.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --info-policy allow-host-ipv6 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-all-policies | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:184:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:184"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:184"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 (active)
priority: -15000
target: CONTINUE
ingress-zones: ANY
egress-zones: HOST
services:
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family=\"ipv6\" icmp-type name=\"neighbour-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"neighbour-solicitation\" accept
rule family=\"ipv6\" icmp-type name=\"router-advertisement\" accept
rule family=\"ipv6\" icmp-type name=\"redirect\" accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:203"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:223" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:223"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_252
#AT_START_253
at_fn_group_banner 253 'policy.at:225' \
  "policy - options" "                               " 11
at_xfail=no
(
  $as_echo "253. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:225: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:225: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:225"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:225: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:225"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:225: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:225"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:225" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:225"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:225" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:225"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:225" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:225"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:225" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:225"








    { set +x
$as_echo "$at_srcdir/policy.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:235:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:235"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:235"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:238"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --remove-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --query-forward
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:264:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:264"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:264"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:266:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:266"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:266"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-egress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-egress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --query-ingress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --list-ingress-zones "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --list-ingress-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --set-priority 5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --set-priority 5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --set-priority 5 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --set-priority 5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/policy.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:282" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:282"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_253
#AT_START_254
at_fn_group_banner 254 'policy.at:284' \
  "policy - priority" "                              " 11
at_xfail=no
(
  $as_echo "254. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:284: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:284: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:284"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:284: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:284"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:284: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:284"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:284" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:284"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:284" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:284"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:284" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:284"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:284" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:284"








    { set +x
$as_echo "$at_srcdir/policy.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy worldToHost
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:291:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:291"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:291"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --get-priority
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-1
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
IN_worldToHost all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:314:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:314"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:314"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:316:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:316"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
IN_worldToHost all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:316"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:324"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:325:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:325"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:325"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/policy.at:340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:340"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/policy.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_worldToHost all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:346"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_worldToHost all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy first "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy first
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy second "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy second
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy third "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy third
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:360"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fourth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fourth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy fifth "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy fifth
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fourth --set-priority -100
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy second --set-priority -5000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy first --set-priority -10000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy third --set-priority -1000
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy fifth --set-priority -10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
IN_first all -- 0.0.0.0/0 0.0.0.0/0
IN_second all -- 0.0.0.0/0 0.0.0.0/0
IN_third all -- 0.0.0.0/0 0.0.0.0/0
IN_fourth all -- 0.0.0.0/0 0.0.0.0/0
IN_fifth all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:396:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:396"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
IN_first all ::/0 ::/0
IN_second all ::/0 ::/0
IN_third all ::/0 ::/0
IN_fourth all ::/0 ::/0
IN_fifth all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:396"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:406:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:406"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority 0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:406"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/policy.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32769
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority -32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32768
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/policy.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy worldToHost --set-priority  32767
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PRIORITY/d'" != x"ignore"; then
            $as_echo "policy.at:412" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PRIORITY/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:412"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_254
#AT_START_255
at_fn_group_banner 255 'policy.at:414' \
  "policy - zones" "                                 " 11
at_xfail=no
(
  $as_echo "255. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:414: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:414: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:414"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:414: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:414"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:414: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:414"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:414" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:414"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:414" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:414"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:414" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:414"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:414" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:414"








    { set +x
$as_echo "$at_srcdir/policy.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:422:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:422"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:422"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:430:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:430"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:430"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:431:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:431"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:433"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:444"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:457:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:457"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:457"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:458:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:458"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:458"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:459:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:459"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:460:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:460"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:460"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:461:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:461"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:461"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/policy.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:471"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:472:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:472"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:472"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:473:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:473"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:474:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:474"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:474"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:475:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:475"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:475"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:485:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:485"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:491:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:491"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:491"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:492:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:492"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:492"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:493:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:493"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:493"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:494:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:494"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:494"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:503"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:507:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:507"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:519:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:519"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:519"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:520:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:520"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --query-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:520"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:521:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:521"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:521"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:522"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:533:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:533"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:534:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:534"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:534"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-ingress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:535"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone=\"does_not_exist\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone="does_not_exist"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/policy.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: internal
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:578:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:578"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:578"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:581:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:581"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:581"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:583:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:583"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:583"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:594"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "policy.at:599" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:599"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_255
#AT_START_256
at_fn_group_banner 256 'policy.at:601' \
  "policy - dispatch" "                              " 11
at_xfail=no
(
  $as_echo "256. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:601: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:601: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:601"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:601: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:601"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:601: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:601"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:601"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:601" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:601"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:601" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:601"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:601" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:601"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:601" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:601"








    { set +x
$as_echo "$at_srcdir/policy.at:604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:604"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:607:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:607"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:607"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-priority -1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:608"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/policy.at:611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:611"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-active-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-active-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6
  ingress-zones: ANY
  egress-zones: HOST
foobar
  ingress-zones: public
  egress-zones: HOST
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:642:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:642"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
IN_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:642"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:653:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:653"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:653"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:655:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:655"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:664:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:664"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:666:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:666"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:666"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:685:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:685"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:685"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:688"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:699"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:712:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:712"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:712"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:714:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:714"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:714"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:717"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:721:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:721"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:721"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:722:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:722"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:722"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:736:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:736"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
IN_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:747:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:747"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:747"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:758:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:758"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:758"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:760:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:760"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:760"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:784:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:784"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:784"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:797:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:797"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:797"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:801"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:817:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:817"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:817"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:821"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:834"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:845"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:848:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:848"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:848"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:858:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:858"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:858"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:860:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:860"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:860"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:863:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:863"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:863"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:866:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:866"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:866"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:877:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:877"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:877"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:880:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:880"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:880"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:894:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:894"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:894"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:913:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:913"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:913"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:914"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:923:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:923"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:923"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:926:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:926"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:926"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:940:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:940"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "OUT_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:940"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:955:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:955"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:955"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:969:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:969"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:969"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:972:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:972"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:972"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:983"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:996:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:996"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:996"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:998:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:998"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:998"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1000:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"HOST\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1000"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="HOST"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1000"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1001:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1001"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1001"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1005"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1006:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1006"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1006"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1015:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1015"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1015"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1018"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1028:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1028"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1028"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1030:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1030"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1030"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1043:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1043"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1043"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1047:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1047"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1047"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1051:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1051"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1051"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1064:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1064"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1064"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1068:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1068"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1068"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1081"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1085"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1104"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1108"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1109"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1118"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1121"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1133"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1143"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1146"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1150"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1154:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1154"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1154"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1166"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1169"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1180"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1183"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1194:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1194"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1194"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1197:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1197"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1197"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1201:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1201"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1201"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1202:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1202"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1202"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1203:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1203"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1203"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1207:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1207"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1207"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1208:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1208"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1208"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1209:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1209"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1209"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1218:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1218"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1218"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1221"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1231:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1231"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1231"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1233"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1243"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1246"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1249"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1253"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1265:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1265"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1265"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1269"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1281"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1303"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1307"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1308"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1309"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1318"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1321"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1331:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1331"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1331"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1333"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1343"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1346"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1354"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1367"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1371"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1384"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1388"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1399"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1401"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1405"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1410"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1411"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1420"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1423"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1433"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1435"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1445"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1448"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1451"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1455"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1467"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1471:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1471"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1471"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1483"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1487"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1498"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1501"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1503:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1503"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1503"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"ANY\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="ANY"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1505"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1522:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1522"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1522"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1525"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1535:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1535"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1535"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1537:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1537"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1537"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1547"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1550"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1554"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1558"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1570:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1570"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1570"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1573"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1584"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1587"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1597"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1599"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1604:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1604"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1604"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1612"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1621"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1624"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1634"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1636:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1636"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1636"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1646:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1646"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1646"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1649:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1649"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1649"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1652:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1652"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1652"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1656:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1656"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1656"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1668:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1668"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1668"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1672"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1684:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1684"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1684"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1698"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1703"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-interface=foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1704"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1705"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1710"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1712:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1712"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1712"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1713:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1713"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1713"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1722:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1722"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1722"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1725"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1735:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1735"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1735"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1737:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1737"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1737"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1747:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1747"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1747"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1750"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1753"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1757:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1757"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1757"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1768"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1771"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1782:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1782"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1782"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1785"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1799:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1799"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1799"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1801:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1801"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1801"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1802:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1802"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1802"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1803:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1803"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1803"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --add-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --add-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1812"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1821"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L INPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1824"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1834:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1834"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1834"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1836:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1836"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L OUTPUT_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1836"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1846:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1846"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 10.10.10.0/24 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1846"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1849:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1849"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1849"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/policy.at:1852:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1852"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1852"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1856:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1856"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1856"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1868"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1872:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1872"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1872"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 10.10.10.0/24 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1884"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1888:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1888"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1888"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi













    { set +x
$as_echo "$at_srcdir/policy.at:1899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_foobar all -- 10.10.10.0/24 10.20.20.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1899"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POSTROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1902"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/policy.at:1904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone=\"internal\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-ingress-zone="internal"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone=\"public\" "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=internal --remove-source=10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1906"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone=public --remove-source=10.20.20.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1907"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:1909" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:1909"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_256
#AT_START_257
at_fn_group_banner 257 'policy.at:1911' \
  "policy - interfaces/sources" "                    " 11
at_xfail=no
(
  $as_echo "257. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:1911: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:1911: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:1911"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:1911: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:1911"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:1911: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1911"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1911"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:1911" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:1911"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:1911" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:1911"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:1911" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:1911"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:1911" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:1911"








    { set +x
$as_echo "$at_srcdir/policy.at:1914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1914"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1915:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1915"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1915"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1916:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1916"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1916"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1917:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1917"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1917"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:1918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1918"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:1918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1918"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:1925:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1925"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1925"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1927:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1927"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1927"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:1933:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1933"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1933"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1942:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1942"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1942"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:1951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1951"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1964"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:1971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1971"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1980:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1980"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1980"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1983:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1983"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWD_foobar all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1983"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:1990:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:1990"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1990"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:1997:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1997"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1997"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:1999:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:1999"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:1999"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:2005:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2005"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2005"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:2014:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2014"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2014"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2018:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2018"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2018"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/policy.at:2024:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2024"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --add-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2024"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi












    { set +x
$as_echo "$at_srcdir/policy.at:2031:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2031"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2031"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2035:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2035"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
PRE_foobar all ::/0 1234::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2035"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/policy.at:2042:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2042"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 1234::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2042"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi











    { set +x
$as_echo "$at_srcdir/policy.at:2053:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2053"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all -- 0.0.0.0/0 0.0.0.0/0
PRE_foobar all -- 0.0.0.0/0 10.10.10.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2053"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2057:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2057"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PREROUTING_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_allow-host-ipv6 all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2057"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/policy.at:2064:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2064"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2064"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/policy.at:2071:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2071"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2071"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2073:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2073"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FORWARD_POLICIES_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2073"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "policy.at:2076" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2076"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_257
#AT_START_258
at_fn_group_banner 258 'policy.at:2078' \
  "policy - target" "                                " 11
at_xfail=no
(
  $as_echo "258. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:2078: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:2078: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:2078"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:2078: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:2078"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:2078: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2078"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2078"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:2078" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:2078"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:2078" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2078"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:2078" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2078"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:2078" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2078"








    { set +x
$as_echo "$at_srcdir/policy.at:2081:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2081"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2081"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2083:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2083"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2083"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2084:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2084"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2084"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2085:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2085"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2085"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2086:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2086"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=REJECT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2086"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2087:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2087"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:2087"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2088:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2088"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/policy.at:2088"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2091:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2091"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2091"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2092:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2092"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2092"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2093:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0  "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2093"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2093"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2094"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2095"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2095:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2095"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2095"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/policy.at:2108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2108"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/policy.at:2116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "policy.at:2116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre all ::/0 ::/0
IN_foobar_log all ::/0 ::/0
IN_foobar_deny all ::/0 ::/0
IN_foobar_allow all ::/0 ::/0
IN_foobar_post all ::/0 ::/0
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2116"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"ignore" != x"ignore"; then
            $as_echo "policy.at:2125" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2125"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_258
#AT_START_259
at_fn_group_banner 259 'policy.at:2127' \
  "policy - from file" "                             " 11
at_xfail=no
(
  $as_echo "259. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/policy.at:2127: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/policy.at:2127: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "policy.at:2127"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/policy.at:2127: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "policy.at:2127"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/policy.at:2127: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2127"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2127"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "policy.at:2127" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/policy.at:2127"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "policy.at:2127" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2127"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "policy.at:2127" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/policy.at:2127"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "policy.at:2127" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2127"








    { set +x
$as_echo "$at_srcdir/policy.at:2130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy allow-host-ipv6 --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2130"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:2131: ls \"./policies/allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:2131"
( $at_check_trace; ls "./policies/allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2131"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:2132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy-from-file \"./policies/allow-host-ipv6.xml\" --name my-allow-host-ipv6 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy-from-file "./policies/allow-host-ipv6.xml" --name my-allow-host-ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2132"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/policy.at:2133: ls \"./policies/my-allow-host-ipv6.xml\""
at_fn_check_prepare_trace "policy.at:2133"
( $at_check_trace; ls "./policies/my-allow-host-ipv6.xml"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2133"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/policy.at:2134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2134"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/policy.at:2137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2137"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/policy.at:2138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --get-policies "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "policy.at:2138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --get-policies
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "allow-host-ipv6 my-allow-host-ipv6
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/policy.at:2138"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "policy.at:2142" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/policy.at:2142"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_259
#AT_START_260
at_fn_group_banner 260 'services.at:1' \
  "services" "                                       " 11
at_xfail=no
(
  $as_echo "260. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/services.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/services.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "services.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/services.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "services.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/services.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "services.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/services.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "services.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/services.at:1"








    { set +x
$as_echo "$at_srcdir/services.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/services.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 10.10.10.0/24 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/services.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/services.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ssh accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ssh accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 ctstate NEW,UNTRACKED
ACCEPT tcp -- 10.10.10.0/24 0.0.0.0/0 tcp dpt:21 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:21 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t raw -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t raw -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
CT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:21 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t raw -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t raw -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "CT tcp ::/0 ::/0 tcp dpt:21 CT helper ftp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-service ftp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=\"10.10.10.0/24\" service name=ftp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address="10.10.10.0/24" service name=ftp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/services.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/services.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-service does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/services.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/services.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/services.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "services.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-interface raboof0 --add-service ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/services.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_SERVICE/d'" != x"ignore"; then
            $as_echo "services.at:97" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_SERVICE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/services.at:97"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_260
#AT_START_261
at_fn_group_banner 261 'ports.at:1' \
  "ports" "                                          " 11
at_xfail=no
(
  $as_echo "261. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "ports.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/ports.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/ports.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:1"








    { set +x
$as_echo "$at_srcdir/ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/ports.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1234 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:1234 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:4321 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/ports.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp dpt:1234 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:1234 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:4321 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:1234 ctstate NEW,UNTRACKED
ACCEPT sctp -- 0.0.0.0/0 0.0.0.0/0 sctp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp ::/0 ::/0 udp dpt:1234 ctstate NEW,UNTRACKED
ACCEPT sctp ::/0 ::/0 sctp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_261
#AT_START_262
at_fn_group_banner 262 'source_ports.at:1' \
  "source ports" "                                   " 11
at_xfail=no
(
  $as_echo "262. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/source_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "source_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/source_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "source_ports.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/source_ports.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "source_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "source_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:1"








    { set +x
$as_echo "$at_srcdir/source_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/source_ports.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:1234 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:1234 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:4321 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/source_ports.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp ::/0 ::/0 tcp spt:1234 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp spt:1234 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp spt:4321 ctstate NEW,UNTRACKED
ACCEPT udp ::/0 ::/0 udp spt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/source_ports.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 4321/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=udp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:1234 ctstate NEW,UNTRACKED
ACCEPT sctp -- 0.0.0.0/0 0.0.0.0/0 sctp spt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp ::/0 ::/0 udp spt:1234 ctstate NEW,UNTRACKED
ACCEPT sctp ::/0 ::/0 sctp spt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-source-port 1234/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule source-port port=4444 protocol=sctp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/source_ports.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/source_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 123443/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-source-port 1234/bogus
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/source_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=99999 protocol=tcp accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/source_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/source_ports.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "source_ports.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule source-port port=4444 protocol=bogus accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/source_ports.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"" != x"ignore"; then
            $as_echo "source_ports.at:107" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/source_ports.at:107"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_262
#AT_START_263
at_fn_group_banner 263 'forward_ports.at:1' \
  "forward ports" "                                  " 11
at_xfail=no
(
  $as_echo "263. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/forward_ports.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "forward_ports.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/forward_ports.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "forward_ports.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/forward_ports.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "forward_ports.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "forward_ports.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:1"








    { set +x
$as_echo "$at_srcdir/forward_ports.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:10.10.10.10:33
DNAT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/forward_ports.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT udp ::/0 ::/0 udp dpt:44 to:[1234::4321]:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/forward_ports.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/forward_ports.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=44:proto=udp:toport=4444:toaddr=1234::4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/forward_ports.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:33 to:10.10.10.10:33
DNAT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-forward-port port=33:proto=tcp:toport=33:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/forward_ports.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/forward_ports.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port 1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcpp:toport=1111
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=11:proto=tcp:toport=1111:toaddr=10.10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/forward_ports.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcpp to-port=1111'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/forward_ports.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=tcp to-port=1111 to-addr=10.10.10.10.10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/forward_ports.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:118:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:118"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:118"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to::2222
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/forward_ports.at:131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT udp ::/0 ::/0 udp dpt:444 to::4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:131"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/forward_ports.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:137:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:137"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:137"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:144:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:144"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:144"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:145:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:145"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:145"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:146:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:146"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:146"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:147"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:152:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:152"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:152"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:156:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:156"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:156"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:157:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:157"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:157"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:158:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:158"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:158"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:159"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:160:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:160"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:160"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-egress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/forward_ports.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:169:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:169"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/forward_ports.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:177:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:177"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:177"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --zone internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:179:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:179"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:179"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-forward-port port=22:proto=tcp:toport=2222:toaddr=10.0.0.1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:180"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:181:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:181"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/forward_ports.at:181"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/forward_ports.at:182:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "forward_ports.at:182"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv4 forward-port port=444 protocol=udp to-port=4444 to-addr=10.44.44.44'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:182"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/forward_ports.at:191:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L PRE_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "forward_ports.at:191"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L PRE_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 to:10.0.0.1:2222
DNAT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:444 to:10.44.44.44:4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/forward_ports.at:191"
$at_failed && at_fn_log_failure
$at_traceon; }









        if test x"-e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d'" != x"ignore"; then
            $as_echo "forward_ports.at:196" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_FORWARD/d' -e '/ERROR: INVALID_ZONE/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/forward_ports.at:196"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_263
#AT_START_264
at_fn_group_banner 264 'masquerade.at:1' \
  "masquerade" "                                     " 11
at_xfail=no
(
  $as_echo "264. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/masquerade.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "masquerade.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/masquerade.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "masquerade.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/masquerade.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "masquerade.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "masquerade.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:1"








    { set +x
$as_echo "$at_srcdir/masquerade.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/masquerade.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0
MASQUERADE all -- 10.10.10.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/masquerade.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/masquerade.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t nat -L POST_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t nat -L POST_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all 1234::/64 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234::/64 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/masquerade.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/masquerade.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_host
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_host --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_host --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar_int_to_pub
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:85:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:85"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:85"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-ingress-zone internal
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/masquerade.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-interface foobar1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/masquerade.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar_int_to_pub --add-rich-rule='rule family=ipv4 source address=10.10.10.0/24 masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/masquerade.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "masquerade.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=internal --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/masquerade.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "masquerade.at:103" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/masquerade.at:103"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_264
#AT_START_265
at_fn_group_banner 265 'protocols.at:1' \
  "protocols" "                                      " 11
at_xfail=no
(
  $as_echo "265. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/protocols.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/protocols.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "protocols.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/protocols.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "protocols.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/protocols.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "protocols.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/protocols.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "protocols.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:1"








    { set +x
$as_echo "$at_srcdir/protocols.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/protocols.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/protocols.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT sctp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED
ACCEPT icmpv6-- 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED
ACCEPT 33 -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED
ACCEPT 47 -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/protocols.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT sctp ::/0 ::/0 ctstate NEW,UNTRACKED
ACCEPT icmpv6 ::/0 ::/0 ctstate NEW,UNTRACKED
ACCEPT 33 ::/0 ::/0 ctstate NEW,UNTRACKED
ACCEPT 47 ::/0 ::/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/protocols.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:54:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:54"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:54"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT icmpv6-- 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED
ACCEPT sctp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT icmpv6 ::/0 ::/0 ctstate NEW,UNTRACKED
ACCEPT sctp ::/0 ::/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-protocol ipv6-icmp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:58:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value=\"sctp\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:58"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule protocol value="sctp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/protocols.at:58"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/protocols.at:93:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:93"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-protocol dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/protocols.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value=\"dummy\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "protocols.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule protocol value="dummy" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/protocols.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            $as_echo "protocols.at:98" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_PROTOCOL: dummy/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/protocols.at:98"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_265
#AT_START_266
at_fn_group_banner 266 'rich_rules.at:1' \
  "rich rules" "                                     " 11
at_xfail=no
(
  $as_echo "266. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_rules.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_rules.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_rules.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rich_rules.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rich_rules.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_rules.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_rules.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:1"








    { set +x
$as_echo "$at_srcdir/rich_rules.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_foobar_pre all ::/0 ::/0
IN_foobar_log all ::/0 ::/0
IN_foobar_deny all ::/0 ::/0
IN_foobar_allow all ::/0 ::/0
IN_foobar_post all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rich_rules.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4             source address=10.10.10.10 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 log accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.11 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.12 reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=0  source address=10.10.10.13 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.10.10.14 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=1  source address=10.10.10.15 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:57:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:57"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.10.10.14 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:57"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG all -- 10.10.10.11 0.0.0.0/0 LOG flags 0 level 4
AUDIT all -- 10.10.10.11 0.0.0.0/0 AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT all -- 10.10.10.12 0.0.0.0/0 reject-with icmp-port-unreachable
DROP all -- 10.10.10.13 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.10.10.10 0.0.0.0/0
ACCEPT all -- 10.10.10.11 0.0.0.0/0
ACCEPT all -- 10.10.10.11 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_rules.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.10.10.15 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_rules.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-1 source address=10.20.20.20 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:111:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:111"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-2 destination address=10.20.20.21 accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:111"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv4 priority=-3 source address=10.20.20.22 destination address=10.20.20.23 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule family=ipv6 priority=-4 source address=1234::4321 destination address=1234::4444 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:126:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:126"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 10.20.20.22 10.20.20.23
ACCEPT all -- 0.0.0.0/0 10.20.20.21
ACCEPT all -- 10.10.10.14 0.0.0.0/0
ACCEPT all -- 10.20.20.20 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:126"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all 1234::4321 1234::4444
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rich_rules.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name=\"neighbour-advertisement\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 icmp-type name="neighbour-advertisement" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:139"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 10.20.20.22 10.20.20.23
ACCEPT all -- 0.0.0.0/0 10.20.20.21
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT all -- 10.10.10.14 0.0.0.0/0
ACCEPT all -- 10.20.20.20 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all 1234::4321 1234::4444
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 128
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 136
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/rich_rules.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:174"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:175:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:175"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:175"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:176:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:176"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:176"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:185:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:185"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK xset 0x6600/0xff00
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:185"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:189:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:189"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK all ::/0 ::/0 MARK xset 0x6600/0xff00
MARK all ::/0 ::/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:189"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:193"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:198:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:198"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:198"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:199:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:199"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:199"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:208:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:208"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK xset 0x6600/0xff00
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:208"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK all ::/0 ::/0 MARK xset 0x6600/0xff00
MARK all ::/0 ::/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:216"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:221:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:221"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:223"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK xset 0x6600/0xff00
MARK all -- 0.0.0.0/0 0.0.0.0/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PRE_foobar_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK all ::/0 ::/0 MARK xset 0x6600/0xff00
MARK all ::/0 ::/0 MARK set 0x4d2
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/rich_rules.at:240:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:240"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:240"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:241:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:241"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:241"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-source 10.10.10.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:245"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --remove-rich-rule='rule priority=-2 mark set=0x6600/0xFF00'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:258:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:258"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --add-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:258"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:259:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:259"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy foobar --add-rich-rule='rule priority=-1 mark set=1234'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/rich_rules.at:259"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:260:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:260"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --zone=public --remove-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:260"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy=foobar --remove-egress-zone public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:263"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix=\"LOG: \" level=\"warning\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32000 log prefix="LOG: " level="warning"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --add-rich-rule='rule priority=32001 audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_rules.at:269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_rules.at:269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:269"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/rich_rules.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.10.10.15 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"'LOG: '\"
AUDIT all -- 0.0.0.0/0 0.0.0.0/0 AUDIT accept
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_rules.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_rules.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG all ::/0 ::/0 LOG flags 0 level 4 prefix \"'LOG: '\"
AUDIT all ::/0 ::/0 AUDIT accept
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_rules.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"-e '/ERROR: INVALID_ZONE:/d'" != x"ignore"; then
            $as_echo "rich_rules.at:292" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ZONE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_rules.at:292"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_266
#AT_START_267
at_fn_group_banner 267 'icmp_blocks.at:1' \
  "ICMP blocks" "                                    " 11
at_xfail=no
(
  $as_echo "267. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_blocks.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/icmp_blocks.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/icmp_blocks.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_blocks.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi














    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 0 reject-with icmp-host-prohibited
REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 5 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 129 reject-with icmp6-adm-prohibited
REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 137 reject-with icmp6-adm-prohibited
REJECT icmpv6 1234:5678::/64 ::/0 ipv6-icmptype 137 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --runtime-to-permanent "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi














    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi










    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmpv6 ::/0 ::/0 ipv6-icmptype 128 reject-with icmp6-adm-prohibited
REJECT icmpv6 1234:5678::/64 ::/0 ipv6-icmptype 137 reject-with icmp6-adm-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --remove-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy foobar --query-icmp-block echo-request
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"redirect\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --query-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="redirect"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/icmp_blocks.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi








    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-icmp-block dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }








    if $IP6TABLES -L >/dev/null 2>&1; then
        :




    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/icmp_blocks.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name=\"dummy\"' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_blocks.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --policy=foobar --add-rich-rule='rule family=ipv6 source address=1234:5678::/64 icmp-block name="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/icmp_blocks.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }





    else
        :

    fi






        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            $as_echo "icmp_blocks.at:148" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_ICMPTYPE:/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/icmp_blocks.at:148"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_267
#AT_START_268
at_fn_group_banner 268 'rich_tcp_mss_clamp.at:5' \
  "tcp-mss-clamp" "                                  " 11
at_xfail=no
(
  $as_echo "268. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:5: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:5"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rich_tcp_mss_clamp.at:5"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_tcp_mss_clamp.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:5"





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:8: mkdir -p ./zones"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:8"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="536"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="pmtu"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp value="thisdoesnotexist"/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:44: grep \"WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value=\"thisdoesnotexist\"
\" ./firewalld.log"
at_fn_check_prepare_notrace 'an embedded newline' "rich_tcp_mss_clamp.at:44"
( $at_check_trace; grep "WARNING: INVALID_RULE: thisdoesnotexist: rule tcp-mss-clamp value="thisdoesnotexist"
" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }



cat >./zones/tcp.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
  <service name="ssh"/>
  <service name="dhcpv6-client"/>
  <rule>
    <tcp-mss-clamp/>
  </rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --check-config "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:65: rm ./zones/tcp.xml"
at_fn_check_prepare_trace "rich_tcp_mss_clamp.at:65"
( $at_check_trace; rm ./zones/tcp.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:69:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:69"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=0'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --query-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --remove-rich-rule='rule tcp-mss-clamp'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=536'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:79:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:79"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=thisdoesnotexist'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:79"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_tcp_mss_clamp.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --add-rich-rule='rule tcp-mss-clamp value=pmtu'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_tcp_mss_clamp.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "TCPMSS tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS set 536
TCPMSS tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }












    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rich_tcp_mss_clamp.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_tcp_mss_clamp.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "TCPMSS tcp ::/0 ::/0 tcp flags:0x06/0x02 TCPMSS set 536
TCPMSS tcp ::/0 ::/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_tcp_mss_clamp.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"ignore" != x"ignore"; then
            $as_echo "rich_tcp_mss_clamp.at:102" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_tcp_mss_clamp.at:102"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_268
#AT_START_269
at_fn_group_banner 269 'rich_destination_ipset.at:1' \
  "rich destination ipset" "                         " 11
at_xfail=no
(
  $as_echo "269. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rich_destination_ipset.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rich_destination_ipset.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rich_destination_ipset.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:1"








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-policy=mypolicy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-ingress-zone ANY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy=mypolicy --add-egress-zone HOST
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set foobar dst
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_mypolicy_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rich_destination_ipset.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_mypolicy_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 match-set foobar dst
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rich_destination_ipset.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination bogus=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rich_destination_ipset.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rich_destination_ipset.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept' "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rich_destination_ipset.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd             --policy mypolicy --add-rich-rule='rule family=ipv4 destination address=10.0.0.1 ipset=foobar accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/rich_destination_ipset.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







        if test x"-e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d'" != x"ignore"; then
            $as_echo "rich_destination_ipset.at:52" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed -e '/ERROR: INVALID_RULE: bad attribute/d'              -e '/ERROR: INVALID_DESTINATION: address and ipset/d' |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rich_destination_ipset.at:52"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_269
#AT_START_270
at_fn_group_banner 270 'zone.at:1' \
  "zone - target" "                                  " 11
at_xfail=no
(
  $as_echo "270. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/zone.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/zone.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "zone.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/zone.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "zone.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/zone.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "zone.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/zone.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "zone.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:1"








    { set +x
$as_echo "$at_srcdir/zone.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=CONTINUE
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=DENY
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/zone.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0 "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --add-interface foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/zone.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "INPUT_POLICIES_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post all -- 0.0.0.0/0 0.0.0.0/0
INPUT_POLICIES_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "INPUT_POLICIES_pre all ::/0 ::/0
IN_foobar_pre all ::/0 ::/0
IN_foobar_log all ::/0 ::/0
IN_foobar_deny all ::/0 ::/0
IN_foobar_allow all ::/0 ::/0
IN_foobar_post all ::/0 ::/0
INPUT_POLICIES_post all ::/0 ::/0
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi














    { set +x
$as_echo "$at_srcdir/zone.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FORWARD_POLICIES_pre all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_pre all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_log all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_deny all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_allow all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_post all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_POLICIES_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:76:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:76"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FORWARD_POLICIES_pre all ::/0 ::/0
FWD_foobar_pre all ::/0 ::/0
FWD_foobar_log all ::/0 ::/0
FWD_foobar_deny all ::/0 ::/0
FWD_foobar_allow all ::/0 ::/0
FWD_foobar_post all ::/0 ::/0
FORWARD_POLICIES_post all ::/0 ::/0
ACCEPT all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:76"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi









    { set +x
$as_echo "$at_srcdir/zone.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --permanent --zone=foobar --set-target=default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/zone.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --reload "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/zone.at:90:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized} firewall-cmd -q --state "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "zone.at:90"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:90"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/zone.at:106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "INPUT_POLICIES_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_log all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_foobar_post all -- 0.0.0.0/0 0.0.0.0/0
INPUT_POLICIES_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:106"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:117:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L IN_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:117"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L IN_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "INPUT_POLICIES_pre all ::/0 ::/0
IN_foobar_pre all ::/0 ::/0
IN_foobar_log all ::/0 ::/0
IN_foobar_deny all ::/0 ::/0
IN_foobar_allow all ::/0 ::/0
IN_foobar_post all ::/0 ::/0
INPUT_POLICIES_post all ::/0 ::/0
ACCEPT icmpv6 ::/0 ::/0
REJECT all ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:117"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi














    { set +x
$as_echo "$at_srcdir/zone.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IPTABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IPTABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FORWARD_POLICIES_pre all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_pre all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_log all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_deny all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_allow all -- 0.0.0.0/0 0.0.0.0/0
FWD_foobar_post all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_POLICIES_post all -- 0.0.0.0/0 0.0.0.0/0
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }











    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/zone.at:153:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t filter -L FWD_foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "zone.at:153"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t filter -L FWD_foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FORWARD_POLICIES_pre all ::/0 ::/0
FWD_foobar_pre all ::/0 ::/0
FWD_foobar_log all ::/0 ::/0
FWD_foobar_deny all ::/0 ::/0
FWD_foobar_allow all ::/0 ::/0
FWD_foobar_post all ::/0 ::/0
FORWARD_POLICIES_post all ::/0 ::/0
REJECT all ::/0 ::/0 reject-with icmp6-port-unreachable
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/zone.at:153"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"ignore" != x"ignore"; then
            $as_echo "zone.at:164" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                        sed ignore |                        grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/zone.at:164"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_270
#AT_START_271
at_fn_group_banner 271 'rpfilter.at:1' \
  "rpfilter" "                                       " 11
at_xfail=no
(
  $as_echo "271. $at_setup_line: testing $at_desc ..."
  $at_traceon



                        test -z "$PYTHON" && export PYTHON="python3"
    test -z "$IPTABLES" && export IPTABLES="iptables"
    test -z "$IPTABLES_RESTORE" && export IPTABLES_RESTORE="iptables-restore"
    test -z "$IP6TABLES" && export IP6TABLES="ip6tables"
    test -z "$IP6TABLES_RESTORE" && export IP6TABLES_RESTORE="ip6tables-restore"
    test -z "$IPSET" && export IPSET="ipset"

            if locale -a |grep "^C.utf8" >/dev/null; then
        LC_ALL="C.UTF-8"
        export LC_ALL
    fi

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


                { set +x
$as_echo "$at_srcdir/rpfilter.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rpfilter.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }
        function kill_networkmanager() {
            if test -f networkmanager.pid; then

    pid=$(< networkmanager.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

            fi
        }

                echo "" > cleanup
        echo "" > cleanup_late
        trap ". ./cleanup; kill_firewalld; kill_networkmanager; . ./cleanup_late" EXIT





        echo "ip netns delete fwd-test-${at_group_normalized}" >> ./cleanup_late
        { set +x
$as_echo "$at_srcdir/rpfilter.at:1: ip netns add fwd-test-\${at_group_normalized}"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rpfilter.at:1"
( $at_check_trace; ip netns add fwd-test-${at_group_normalized}
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




        $as_echo "rpfilter.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} sh -c "{ $IPTABLES_RESTORE -h || $IPTABLES -h; }" >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rpfilter.at:1"




        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>

            <!-- from org.freedesktop.NetworkManager.conf -->
            <policy user="root">
                    <allow own="org.freedesktop.NetworkManager"/>
                    <allow send_destination="org.freedesktop.NetworkManager"/>

                    <allow send_destination="org.freedesktop.NetworkManager"
                           send_interface="org.freedesktop.NetworkManager.PPP"/>

                    <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/>
                    <!-- These are there because some broken policies do
                         <deny send_interface="..." /> (see dbus-daemon(8) for details).
                         This seems to override that for the known VPN plugins.
                      -->
                    <allow send_destination="org.freedesktop.NetworkManager.openconnect"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.openvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.pptp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.vpnc"/>
                    <allow send_destination="org.freedesktop.NetworkManager.ssh"/>
                    <allow send_destination="org.freedesktop.NetworkManager.iodine"/>
                    <allow send_destination="org.freedesktop.NetworkManager.l2tp"/>
                    <allow send_destination="org.freedesktop.NetworkManager.libreswan"/>
                    <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/>
                    <allow send_destination="org.freedesktop.NetworkManager.strongswan"/>
                    <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/>

                    <allow send_destination="org.fedoraproject.FirewallD1"/>

                    <!-- Allow the custom name for the dnsmasq instance spawned by NM
                         from the dns dnsmasq plugin to own it's dbus name, and for
                         messages to be sent to it.
                     -->
                    <allow own="org.freedesktop.NetworkManager.dnsmasq"/>
                    <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/>
            </policy>
            </busconfig>
_ATEOF


            DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}" --print-pid --config-file="./dbus.conf" `
            if test $? -ne 0; then
                $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
            fi
            echo "kill $DBUS_PID" >> ./cleanup_late







    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        ${at_debug_p} && FIREWALLD_ARGS="--debug=9 ${FIREWALLD_ARGS}"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rpfilter.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized} firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rpfilter.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:1"






    KERNEL_MAJOR=`uname -r | cut -d. -f1`
    KERNEL_MINOR=`uname -r | cut -d. -f2`
    if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 10 || test ${KERNEL_MAJOR} -gt 4; then
        :





    else
        :





    fi







    if $IP6TABLES -L >/dev/null 2>&1; then
        :


    { set +x
$as_echo "$at_srcdir/rpfilter.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-\${at_group_normalized}\"     ip netns exec fwd-test-\${at_group_normalized}     sh <<-\"HERE\"
    { { { { \$IP6TABLES -w -n -t mangle -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rpfilter.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-${at_group_normalized}"     ip netns exec fwd-test-${at_group_normalized}     sh <<-"HERE"
    { { { { $IP6TABLES -w -n -t mangle -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 134
ACCEPT icmpv6 ::/0 ::/0 ipv6-icmptype 135
DROP all ::/0 ::/0 rpfilter validmark invert
PREROUTING_direct all ::/0 ::/0
PREROUTING_ZONES all ::/0 ::/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rpfilter.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }



    else
        :

    fi








        if test x"" != x"ignore"; then
            $as_echo "rpfilter.at:30" >"$at_check_line_file"
(cat ./firewalld.log |                        sed "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" |                                                grep '^[0-9-]*[ ]\+[0-9:]*[ ]\+\(ERROR\|WARNING\)') \
  && at_fn_check_skip 99 "$at_srcdir/rpfilter.at:30"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_271
